IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Wednesday, 22 March

02:23

Did We Just Change Animation Forever? Lifeboat News: The Blog

ANYONE can make a cartoon with this groundbreaking technique. Want to learn how? We made a ONE-HOUR, CLICK-BY-CLICK TUTORIAL on http://www.corridordigital.com/

Watch the full ROCK PAPER SCISSORS anime on Corridor https://youtu.be/GVT3WUa-48Y

This project has been a huge labor of love, and it is due to the amazing open-source community that we have this technology available to us. We hope that by sharing our discoveries and techniques that we can help push this technology forward for everyone. If you want to dip your toes into this tech, there are many amazing online communities ready to help teach you, including ours!

With Your Support, We Can Make More!
This project exists because of the amazing members of CorridorDigital, our INDEPENDENT STREAMING PLATFORM. All memberships begin with a 14-Day Free Trial and you can Cancel Anytime. Consider becoming a member yourself! http://www.corridordigital.com/learn-more.

Anime Rock, Paper, Scissors Shirt?!
Available only until March 6th, we have a limited-edition Anime Rock Paper Scissors t-shirt and longsleeve design to celebrate this release. Check it out here! http://corridordigital.store/
Design by Kendrra Thoms https://kendrrathoms.com/

Gear Used
Puget Systems Computers: http://bit.ly/PC_Puget_Workstations.
Lighting by Aputure: http://bit.ly/CORRIDOR_LIGHTS

02:22

Humans predicted to achieve immortality within the next 8 years Lifeboat News: The Blog

If its always been your dream to have the ability to live forever, you may be in luck as scientists believe we are just seven years away from achieving immortality. Futurist and computer scientist Ray Kurzweil has made predictions on when the human race will be able to live forever and when artificial intelligence (AI) will reach the singularity, and he believes it could be possible as early as 2030.

02:19

Web Survey Shows Microsoft Falling Below 15% Market Share in Africa, Only One Minuscule African Nation Has Windows Majority Techrights

Microsoft Falling Below 15% Market Share in Africa

Summary: A Web survey that measured Microsoft Windows at 97% in Africa (back in 2010) says that Windows has become rather small and insignificant; the Microsoft-sponsored mainstream media seems to be ignoring this completely, quite likely by intention

02:09

Rumours of More Microsoft Layoffs Tomorrow (Including Managers!), Probably Azure Again (Many Azure Layoffs Every Year Since 2020) Techrights

As of a fortnight ago: (with some comments since then; expect the media to not mention Microsofts layoffs and instead focus on Microsofts paid-for spam about inane chatbots and hey hi or AI)

Most mid-mgmt with less than 8 reportees are a direct target. Only discussion limited to VP & above us. Better be prepared!! India & USA teams in cloud !!

Summary: Amazon is laying off AWS staff and Microsoft has been laying off Azure staff for 3 years already, including this year, so it seems like the clown computing bubble is finally bursting

02:08

Breach Forums to Remain Offline Permanently HackRead | Latest Cybersecurity and Hacking News Site

By Waqas

One of the Breach Forums administrators who goes by the alias Baphomet has decided to shut down the forum permanently.

This is a post from HackRead.com Read the original post: Breach Forums to Remain Offline Permanently

01:36

Low-Cost Device Can Measure Air Pollution Anywhere SoylentNews

Open-source tool from MIT's Senseable City Lab lets people check air quality, cheaply.

Air pollution is a major public health problem: The World Health Organization has estimated that it leads to over 4 million premature deaths worldwide annually. Still, it is not always extensively measured. But now an MIT research team is rolling out that could enable people to track air quality more widely.

The detector, called Flatburn, can be made by 3D printing or by ordering inexpensive parts. The researchers have now tested and calibrated it in relation to existing state-of-the-art machines, and are publicly releasing all the information about it - how to build it, use it, and interpret the data.

The Flatburn concept at Senseable City Lab dates back to about 2017, when MIT researchers began prototyping a mobile pollution detector, originally to be deployed on garbage trucks in Cambridge, Massachusetts. The detectors are battery-powered and rechargable, either from power sources or a solar panel, with data stored on a card in the device that can be accessed remotely.

In both cases, the detectors were set up to measure concentrations of fine particulate matter as well as nitrogen dioxide, over an area of about 10 meters. Fine particular matter refers to tiny particles often associated with burning matter, from power plants, internal combustion engines in autos and fires, and more.

"The goal is for community groups or individual citizens anywhere to be able to measure local air pollution, identify its sources, and, ideally, create feedback loops with officials and stakeholders to create cleaner conditions," says Carlo Ratti, director of MIT's Senseable City Lab.

Journal Reference:
An Wang, Yuki Machida, Priyanka deSouza, Simone Mora, Tiffany Duhl, Neelakshi Hudda, John L. Durant, Fbio Duarte, Carlo Ratti, Leveraging machine learning algorithms to advance low-cost air sensor calibration in stationary and mobile settings [open], Atmospheric Environment, Volume 301, 2023, 119692, ISSN 1352-2310, DOI: https://doi.org/10.1016/j.atmosenv.2023.119692


Original Submission

Read more of this story at SoylentNews.

01:33

[Meme] EPOs Management Brainstorm Techrights

Union-busting becomes Team-busting becomes Team-bringing becomes Bringing teams becomes Bringing teams apart becomes Bringing teams together
Team Campinos, led by a fake socialist and pathological liar

Summary: The story behind a misleading slogan told above

01:32

Multiple vulnerabilities in Jenkins plugins Open Source Security

Posted by Daniel Beck on Mar 21

Jenkins is an open source automation server which enables developers around
the world to reliably build, test, and deploy their software.

The following releases contain fixes for security vulnerabilities:

* JaCoCo Plugin 3.3.2.1
* OctoPerf Load Testing Plugin 4.5.1, 4.5.2, and 4.5.3
* Pipeline Aggregator View Plugin 1.14
* Role-based Authorization Strategy Plugin 587.588.v850a_20a_30162

Additionally, we announce unresolved security issues in...

01:24

The Photo Ops Festival of the Funky President Antnio Campinos and Revolt From the Patent Examiners Whom He Perpetually Oppresses Techrights

Video download link | md5sum ae22085fbb10ba705b2660a2b3208158
EPO Site Survey
Creative Commons Attribution-No Derivative Works 4.0

Summary: European Patents are being granted for no reason other than application and renewal fees, awarding European monopolies to companies that arent even European (only about a third are actually European); staff of the EPO is fed up as it regards or views all this as an extreme departure from the EPOs mission (and its also outright illegal)

THE EPOs official Web site has been full of fluff, misdirection, and promotion of illegal things (which are nonetheless lobbied for by multinational oligarchy, hence no legal consequences for such promotion). Benot Battistelli and Antnio Campinos have basically trashed the site, turning it into a self-serving shrine that promotes shallow politics, not science. The latest publications there are discussed in the video above, but meanwhile theres some news from EPO staff about Bringing Teams Together. To quote a publication dated yesterday:

20 March 2023
su23015cp 0.2.1 0.2.4 4.4

Bringing Teams Together (BTT)

Dear colleagues,

Bringing Teams Together (BTT) is becoming a reality, despite the many questions and objections that have been formulated by your Staff Representation1.

From the echos received, it seems BTT will be implemented by the line managers in all possible interpretations and variations, according to the mood and inspiration of the day2.

We would like to get an idea of what is happening in the different teams: what, if any, policy or principle is used to allocate fixed workplaces to staff. Bear in mind that the administration has given the...

01:04

Slice and Save Costs with Open Packet Broker Linux.com

Enterprise data centers continuously monitor network traffic to improve performance, provide better customer experience, and identify threats. All these appliances or tools require only a portion of the network payload to meet the monitoring requirements. Modern Network Packet brokers use Packet truncation technique to optimize the processing of network traffic which involves the removal of portions of network packets that are not needed for analysis.

Need for Packet Truncation

Reduce Storage: Network traffic payload can be very large (64 to 9216), and storing everything will be expensive. Packet truncation helps reduce the amount of data that needs to be stored by removing irrelevant or redundant information from packets.

Reduce CPU Cycles: Truncated packets require less processing to analyze, which can improve the overall speed and performance of the tools.

Simplify Analysis: Network administrators can easily identify network performance issues more quickly and efficiently since truncated packets have the relevant portions of the packet.

Improve Security: By removing sensitive information from the payload, security can be improved by limiting the exposure of confidential data.

Open Packet Broker for Truncation

Aviz Open Packet Broker industry first Packet broker solution built on Open Networking NOS SONiC supporting truncation on commodity ASICs supporting wire-speed packet truncation. Open Packet broker truncation has the following capabilities.

  • Packet Truncation based on custom offsets (48 bytes to 4094 bytes).
  • VLAN tag insertion for truncated packets for different tooling purposes.
  • Load Balance across tools for optimal processing 

Packet Truncation or slicing will allow only the user-defined byte from an incoming packet, and the remaining bytes are discarded. This helps in reducing the quantity of data processed on the tool port.

...

01:03

Security updates for Tuesday LWN.net

Security updates have been issued by Debian (apache2), Oracle (firefox, nss, and openssl), Slackware (curl and vim), SUSE (dpdk, firefox, grafana, oracleasm, python-cffi, python-Django, and qemu), and Ubuntu (ruby2.7, sox, and tigervnc).

01:00

Vinyl Sales Ran Circles Around CDs in 2022 Hackaday

How do you take your music these days? For those in Camp Tangible, it seems our ranks are certainly growing, and in the analog direction. For the first time since 1987, vinyl record sales have outperformed CD sales in the US, according to a new report. The CD, which saved us all from the cassette, was a digital revolution in music. But for some, the love was lost somewhere among the ones and zeroes.

Those who prefer pure analog troughs of sound cut into wax have never given up on vinyl, and the real ones probably gobbled up a bunch of it in the 90s when everybody was CD-crazy. But mind you these arent used vinyl sales were talking about, which means that enough new vinyl has to have been readily available for purchase for quite some time now. Although it doesnt really seem like that long, new vinyls been back for almost 20 years and according to the report, 2022 was the 16th consecutive year of growth for record sales.

So Why Vinyl?

Nostalgia aint what it used to be, but there was a time in my 1980s childhood when vinyl was all this scribe had to listen to. I have historically been a bit slow to adopt new music formats I didnt have a CD player until 1998, and it was given to...

00:36

Crypto ATM Manufacturer General Bytes Suffers $1.5m Bitcoin Theft HackRead | Latest Cybersecurity and Hacking News Site

By Habiba Rashid

The company has disclosed the wallet addresses and three IP addresses used by the attacker in the hack.

This is a post from HackRead.com Read the original post: Crypto ATM Manufacturer General Bytes Suffers $1.5m Bitcoin Theft

00:23

Fourier Transformations Reveal How AI Learns Complex Physics Lifeboat News: The Blog

One of the oldest tools in computational physics a 200-year-old mathematical technique known as Fourier analysis can reveal crucial information about how a form of artificial intelligence called a deep neural network learns to perform tasks involving complex physics like climate and turbulence modeling, according to a new study.

The discovery by mechanical engineering researchers at Rice University is described in an open-access study published in the journal PNAS Nexus, a sister publication of the Proceedings of the National Academy of Sciences.

This is the first rigorous framework to explain and guide the use of deep neural networks for complex dynamical systems such as climate, said study corresponding author Pedram Hassanzadeh. It could substantially accelerate the use of scientific deep learning in climate science, and lead to much more reliable climate change projections.

00:00

Metal-Detecting Drone Could Autonomously Find Landmines IEEE Spectrum



Metal detecting can be a fun hobby, or it can be a task to be completed in deadly earnestif the buried treasure youre searching for includes landmines and explosive remnants of war. This is an enormous, dangerous problem: Something like 12,000 square kilometers worldwide are essentially useless and uninhabitable because of the threat of buried explosives, and thousands and thousands of people are injured or killed every year.

While there are many different ways of detecting mines and explosives, none of them are particularly quick or easy. For obvious reasons, sending a human out into a minefield with a metal detector is not the safest way of doing things. So, instead, people send anything else that they possibly can, from machines that can smash through minefields with brute force to well-trained rats that take a more passive approach by sniffing out explosive chemicals.


Because the majority of mines are triggered by pressure or direct proximity, a drone seems like it would be the ideal way of detecting them non-explosively. However, unless youre only detecting over a perfectly flat surface (and perhaps not even then) your detector wont be positioned ideally most of the time, and you might miss something, which is not a viable option for mine detection.

But now a novel combination of a metal detector and a drone with five degrees of freedom is under development at the Autonomous Systems Lab at ETH Zurich. It may provide a viable solution to remote landmine detection, by using careful sensing and localization along with some twisting motors to keep the detector reliably close to the ground.

The really tricky part of this whole thing is making sure that the metal detector stays at the correct orientation relative to the ground surface so theres no dip in its effectiveness. With a conventional drone, this wouldnt work at all, because every time the drone moves in any direction but up or down, it has to tilt, which i...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Tuesday, 21 March

23:50

Open-Source NVIDIA Vulkan Driver "NVK" Begins Running Game While Using GSP Firmware Phoronix

Red Hat developer David Airlie has shown off the progress being made on bringing up not only the open-source Mesa NVIDIA Vulkan driver "NVK" but doing so while making use of the NVIDIA GPU System Processor (GSP) firmware that ultimately is needed for being able to deliver better open-source driver support and performance...

23:26

Asahi Linux Continues Making Progress On Apple Silicon Graphics, Promising OpenGL Speed Phoronix

Asahi Linux developer Asahi Lina has posted an update on the ongoing work bringing up their Rust-written DRM kernel driver along with the AGX Gallium3D Mesa OpenGL driver as well as progress towards the in-development Vulkan driver too...

23:09

Internet Archives Copyright Battle with Book Publishers Nears Climax TorrentFreak

In 2020, publishers Hachette, HarperCollins, John Wiley and Penguin Random House sued the Internet Archive (IA) for copyright infringement, equating its Open Library to a pirate site.

IAs library is a non-profit organization that scans physical books, which can then be lent out to patrons in an ebook format.

Staying true to the centuries-old library concept, only one patron at a time can get a copy. These restrictions were temporarily loosened at the height of the Covid epidemic when IA launched the National Emergency Library.

Mass Copyright Infringement or Fair Use?

The publishers see IAs library as a rogue operation that engages in willful mass copyright infringement, directly damaging their bottom line. As such, they want it permanently taken down.

Without any license or any payment to authors or publishers, IA scans print books, uploads these illegally scanned books to its servers, and distributes verbatim digital copies of the books in whole via public-facing websites, their complaint reads.

The publishers are not against libraries per se, nor do they object to ebook lending. When lending digital content, authorized libraries typically obtain a license or negotiate specific terms. The Internet Archive has no such license.

The Internet Archive wholeheartedly disagrees with the copyright infringement allegations. Stressing that the library offers a vital service, Internet Archives defense centers on the legal concept of fair use.

The Archive states that making a digital copy of a physical book transforms the original work before it is loaned to one patron at a time. That would qualify as fair use, they argue, especially since there is no profit motive.

Another factor in favor of fair use is the fact that there are numerous benefits to the public at large. There is also no evidence to show that the book publishers sales or traditional licensing revenues were impacted.

New York Court Hearing

Over the past two-and-a-half years, the parties have gone back and forth in court, disputing each others arguments. This eventually resulted in contrasting motions for summary judgment, with both sides hoping for a ruling in their favor ahead of the trial.

Yesterday, IA and the publ...

23:08

Xen Security Advisory 429 v3 (CVE-2022-42331) - x86: speculative vulnerability in 32bit SYSCALL path Open Source Security

Posted by Xen . org security team on Mar 21

Xen Security Advisory CVE-2022-42331 / XSA-429

x86: speculative vulnerability in 32bit SYSCALL path

UPDATES IN VERSION 3
====================

Public release.

ISSUE DESCRIPTION
=================

Due to an oversight in the very original Spectre/Meltdown security work
(XSA-254), one entrypath performs its speculation-safety actions too
late.

In some configurations, there is an...

23:05

Xen Security Advisory 428 v3 (CVE-2022-42333,CVE-2022-42334) - x86/HVM pinned cache attributes mis-handling Open Source Security

Posted by Xen . org security team on Mar 21

Xen Security Advisory CVE-2022-42333,CVE-2022-42334 / XSA-428

x86/HVM pinned cache attributes mis-handling

UPDATES IN VERSION 3
====================

Public release.

ISSUE DESCRIPTION
=================

To allow cachability control for HVM guests with passed through devices,
an interface exists to explicitly override defaults which would
otherwise be put in place. While not exposed to...

23:03

Xen Security Advisory 427 v2 (CVE-2022-42332) - x86 shadow plus log-dirty mode use-after-free Open Source Security

Posted by Xen . org security team on Mar 21

Xen Security Advisory CVE-2022-42332 / XSA-427

x86 shadow plus log-dirty mode use-after-free

UPDATES IN VERSION 2
====================

Public release.

ISSUE DESCRIPTION
=================

In environments where host assisted address translation is necessary
but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests
in so called shadow mode. Shadow mode maintains a...

22:54

5 Best Tricks To Grasp Casino Games h+ Media

5 Best Tricks To Grasp Casino Games

You will uncover 888 Sport, 888 Poker, and 888 Bingo are available via your membership, providing you with the fullest playing experience attainable on-line. 888 Casino software is available for iOS and Android mobile units. No matter whether or not youre utilizing iPad, iPhone, Mac/PC, Android, or Windows Phone, you can be a part of 888 to play video games and win huge quantities.

The plant visits provided by NDIM are really enriching, I visited Coca Cola and Yamaha Factories from the college. The Placement cell also gave me superb internships with Urban Company and PepsiCo which were a unbelievable learning experience. Overall, NDIM presents a whole package deal for all of the aspiring college students who goal for a bright future.

The significance of embracing change in on an everyday basis life is commonly underscored. Although changes in life are inevitable, adjusting to them may not be the same for everybody. Anxiety is a reasonably frequent time period used to describe extreme fear or worry. However, there are various types of nervousness problems, and whereas they share some common signs, they are somewhat differe Talk to individuals you belief and could be honest with.

CasinoThis is the main part that includes all games the bookie has. For occasion, as a substitute of betting on whose hand will be higher in Baccarat, you bet on the Bankers hand to be 8. The bookie works with the top software builders like NetEnt and Microgaming. When it involves Android sport apps, Puss888 is among the most well-known and feature-rich choices on the market. Its categorised as a Casino app on Google Play and has the best consumer rating of any app in its category.

They embrace huge names like Amaya, Big Time Gaming, Evolution, NetEnt, NYX, Pragmatic Play, Quickspin, Yggdrasil, SG Interactive, Red Tiger and many others. Deposit $20+ using the promo code SNL20 and get 20% as much as $100 bonus with Live Casino or any other recreation. Deposit $20+ utilizing the promo code TravelThurs and get 20% up to $100 FreePlay in two top vacation spot video games. Deposit $20+ using the promo code TableTues and get 30% as a lot as $150 FreePlay when you play at three of the highest classic casino tables.

When Casino 888 started, the idea of gambling on-line was relatively a new idea. The potential of the internet became more evident as it reached each home. Then on-line casinos began showing providing traditional casino video games such as slots, poker and roulette.

While the countrys rules prohibit real-life sports betting with uncommon exceptions, online bookmakers can function openly. Moreover, 4ra Bet is a authorized betting site in India since its licensed by Curacao, which gives it a legal status and ensures truth...

22:52

Casinoly Sports Evaluate h+ Media

Casinoly Sports Evaluate

If sure, then take the innocence check via the rice purity take a look at and know higher about his inside personality. To know extra info, then simply go to right here. Reply your submit has informative & valuable content material, it will be helpful. Id personally favor sorts produce linked with manuscript I think You put a great deal of push to make this text. The web site is affectionately adjusted and spared as much as date.

Bet365 is at present offering 4 sign-up presents to new prospects. They are available for Sports, Casino, Poker, and Games platforms on this brands website. All these provides apply to new clients who are 18 or older.

I am actually enjoying the theme/design of your weblog. Extra of your helpful info. Admiring the dedication you put into your weblog and in depth info you provide. Hey that is considerably of off matter but I was desirous to know if blogs use WYSIWYG editors or if you need to manually code with HTML.

I may be coming again to your weblog for additional quickly. Reply I totally perceive what you may have explained. Actually, I browsed throughout your a number of different content material articles and I do consider you are absolutely right. Congrats with this specific blog.

The on line casino also has a Add to Favorite characteristic on the positioning so that you can access all of your most-loved games in one place. The video games additionally feature cold and hot icons that will help you make a extra informed choice when you select your subsequent game on the location. Is an internationally acknowledged firm that has hundreds of followers all over the world. The firm offers its users a wide range of sports betting choices, generous bonuses, a handy utility, and far more.

Im gonna watch out for brussels. I can appreciate in case you hold this in future. A variety of folks might be benefited from your writing. I simply stumbled upon your blog and needed to mention that ive sincerely liked browsing round your weblog posts.

Come on, man, Yes, it was my choice to learn, however I just thought youd have some thing interesting to state. All I hear can be plenty of whining about something that you would repair when you werent too busy looking for attention. Reply I am very pleased to learn this. This is the type of particulars that needs to be given and not the random misinformation that is on the other blogs. Appreciate your sharing this best doc.

I have been browsing online greater than three hours right now, but I by no means discovered anything that grabbed my interest as a lot as this piece. The reality is, he isnt just a pushover. He is principally that particular variety of person strong enough to take all of that good natured ribbing for exactly what it is.

Later, the state fee introduced those exact same sportsbooks as those that would initially enter the market upon NY online...

22:52

Rummy Wealth Apk Obtain & Get Fifty One Bonus h+ Media

Rummy Wealth Apk Obtain & Get Fifty One Bonus

Be it a sundown, the evening sky, a butterfly, or a rain All I can put my restoration all the method down to is a love for all times, nature, my loving family, and of course horses they gave an entire different focus to my life. I endure from an nervousness dysfunction and an intense quantity of intrusive ideas. I really have tried to however all I end up doing is punish mysel Be aware Before Sharing my story.I wanna say why Im sharing it. Because of my excessive carelessness attitude, Till now Im suffering it shouldnt happen to another individual for folkss knowled

Here you will find an in depth assortment of world markets, each providing very appealing deals. Dedicated markets for many who anticipate what would possibly happen throughout a match, so there are Fixed and Fancy markets. Youll immediately receive a secret code, consisting of letters and numbers, to your mobile phone quantity, which you registered when you created your user account. Our user-friendly web site will guide you through each step of the finest way once you create an account.

The navigation is very simple, and you wont have the flexibility to confuse something right here just because there is solely Cricketbook, Exchange, Live Casino, and a slot machine section. The residence web page is in mild gray and blue, the sport icons are shiny, and youll quickly discover all areas of the casino and bookmaker. One of essentially the most diversified and interesting bonuses. You can get completely different bonuses on totally different days.

There are also progressive slot games such as Millionaire Genie, Aztec Realm and far more. This means you have a possible to make huge wins. There are over 650 on-line slot games on 888 Casino. Some slot machine video games include Respin Rhino, Golden Goddess, Luxor, Elephant King and tons of more. This means you can take pleasure in particular promos from Sunday to Saturday.

Every time I faced challenges in Academics or placement, they were at all times there to help me. The immense publicity at this campus added so much to my confidence and presentation expertise. Overall, I am thankful to NDIM for all the educational and my placement in a desired profile with a great company like Dabur. I was helped to unravel the issue in the on-line chat on the official web site. Yes, the net site administration might request 4rabet account verification.

Go to the official 4raBet website, discover the Register button. Enter all the required data, together with your e mail address, nation, preferred billing currency, and password. Confirm all these steps and open a brand new account. You have 12 bets, totals, over/under, handicaps, as properly as those distinctive to a certain sport like who wins the coin toss.

The main condition is the provision of uninterrupted Internet. Replenish your dep...

22:51

Why Sleeper Trains are Being Revived Across Europe SoylentNews

Why sleeper trains are being revived across Europe:

[...] Living in the Swedish capital Stockholm, the 33-year-old regularly travels by rail, not only to visit her family in Luxembourg, but also to her holiday destinations.

She favours train travel over flying mainly for environmental reasons. Yet she adds that trains are simply more enjoyable, especially sleeper services.

[...] The carbon footprint is just a fraction of a flight. Flying from Stockholm to Hamburg results in around 250kg of carbon dioxide emissions per passenger, according to calculation website EcoPassenger. By contrast, the C02 released by travelling via electric-powered train is just 26kg.

The SJ night train has nine coaches, and capacity to carry 400 passengers. Dan Olofsson, head of tendered services at SJ, says the new service was proposed by the Swedish government, "as they wanted to move more people towards climate-friendly travelling, and one of the solutions was the night train between Sweden and Germany".

The service is powered by renewable energy, and Mr Olofsson says it is typically being used by Swedes to connect them to other rail services from Hamburg.

"Hamburg isn't the main destination for most travellers, but is an important hub for people to reach more destinations in Germany and France and so on," he says.

[...] However, depending on the location, and especially if starting from the UK, travelling by train can often be more expensive than flying. Trains fares in the UK can in fact be 50% more costly than flights, according to a 2021 study by consumer choice magazine Which?.

"Like flying, you do need to book ahead to find a cheaper price," says Mark Smith, founder of train guide website Seat61. "But you need to remember airlines pay no duty on fuel.


Original Submission

Read more of this story at SoylentNews.

22:50

Bet365 App For Android And Ios h+ Media

Bet365 App For Android And Ios

Bringing a contemporary and engaging interface that is consumer friendly and makes it simple to navigate. Every on-line betting website has its personal process in terms of putting bets, however typically, it goes something like this. Reply cate the great from the terrible every now and then, but i believe youve nailed it! Might you ideas updating your weblog with further records? This publish might be by which ive been given the utmost helpful statistics for my research. It appears to me they all are undoubtedly terrific.

BetMGM is one other US primarily based sports betting app that gives stay in sport betting across a variety of markets. Caesars Sportsbook is Saturday Down Souths most popular sports activities betting app. I do bear in mind all the requirements youve delivered in your publish. Theyre very convincing and will undoubtedly work. No matter the fact that, the posts are too brief for starters. Ought to you please improve them a bit from subsequent time?

Absolutely needed to tell you which you may have folks like me who recognize your work. The information which you have furnished could additionally be very helpful. Im excited to uncover this internet page.

You wouldnt have to sit down at home on the pc, you can place bets or play on-line casinos from anywhere on the planet, wherever youre. All you want is your smartphone, a cellular app, and a good web connection. I research one thing tougher on completely different blogs everyday. Its going to all the time be stimulating to be taught content material from other writers and observe slightly bit one thing from their retailer. Id choose to use some with the content material on my weblog whether you dont mind.

This could be any amount, but its necessary to keep in mind that the wager will need to be doubled each time a loss happens. Thus, even should you lose a couple of chips, you will wager a bigger quantity and get your a reimbursement. Once you win, you go back to the preliminary guess. Generally, each of these recreation variations has different design and table structure, making it simple to differentiate them. The solely major distinction between the American roulette and others is that it has a double zero bet with greater odds.

The world of Internet gambling remains to be unmfamiliar to people on the planet, although with daily the number of people who play is going up. This is the proper blog for anyone who actually desires to know this subject. I am extremely impressed collectively along with your writing abilities as smartly as with the structure in your weblog.

I will bookmark your blog and verify once more right here regularly. I like the valuable data you provide in your articles. We absolutely love your weblog and find a lot of your submits to be just what Im looking for.

Just after researching all through the varied search engine...

22:49

888 Casino In India h+ Media

888 Casino In India

Thanks to the usability of those video games, 888 has received a quantity of awards recognizing its excellence in the business. It also incorporates many video games from third-party software developers; for example, it sources slot games from a dozen or extra totally different suppliers, primarily Dragonfish. WhatsApp numbers are provided, with the assistance of which you will find a way to assist on-line, and its speaking staff can very nicely solve the problem with you within the app. Support a quantity of game modes that are updated daily by the developer to attract more gamers. If you people add your money on this application, then you would possibly be additionally given extra bonus in it. I can deposit easily and withdraw rapidly to my wallet.

Game software implemented at the site guarantee players of equity of outcome and returns. It is often audited by the unbiased auditing company, eCOGRA. Their service additionally covers a complete FAW section that can offer you more steerage. Contacting the professional providers of 888 Casino can be achieved by e-mail and thru live chat. Your account steadiness will reveal the brand new whole minus the withdrawal quantity made.

NDIM has Excellent college with prior Industry experience they usually not solely provide us with academic information but also share sensible insights to business circumstances. I am actually grateful to NDIM for giving me such an excellent begin to my profession. When many individuals across the world have been losing jobs, I got a tremendous campus placement with Indias main EdTech Company, Byjus valued at over $11bn.

At 888 Casino, you will discover a incredible blend of slot video games starting from official movie slots to games that depict legendary gods. Every type you could think of and theme conceivable, they are all right here in great quantity. First, there is no better gaming expertise that whats offered at 888 Casino. Here you may be given access to four different gaming platforms, all linked to the 888 Casino.

At least I was not the one who would say You have every thing in your life, what are you sad/depressed about? [newline]Depression is not an sickness to be afraid off. Now I am able to understand folks beneath depression better. I attempt to do all that I can in my capability to make this rather taboo matter, mental health, a dinner-table dialog. The greatest tag line I can describe to myself is changing life from Suicide to survival. I really feel begin actual is the most effective reward one can give to themselves.

The presence of chance is maybe the most noticeable parallel. This is a elementary a part of gambling and one of the important connections between wagering on soccer and playing at a casino. While familiarity with the game and the league may help you make educated wagers, you cant affect the result of the sport no matter how a lot you research it. The major w...

22:48

Search End Result For Bet365 h+ Media

Search End Result For Bet365

Reply Amazing submit it is stuffed with information and informative content good work stick with it. Are you having points converting the worth of bits into real money, like the US dollar? Then, dont fret youve come to the right place. I know one software about bits to USD, With the help of this device its easier to transform twitch bits to USD by knowing the

I also can at this level look ahead to my future. Thanks for your time very much for the expert and sensible information. I is not going to be reluctant to recommend your websites to any person who ought to get tips about this topic. Reply I recognize your work , thanks for all of the informative weblog posts.

Natually Ill offer you a link in your web weblog. Reply It was extraordinarily useful for me. Im cheerful I found this weblog. Much obliged to you for offering to us, I too dependably gain some new useful knowledge from your publish. I am sending it to a quantity of buddies ans moreover sharing in scrumptious.

Thanks for making one thing price reading. Reply This weblog usually appears to acquire a large ammount of visitors. It includes a good individual twist on things. I suppose having one thing genuine or substantial to precise is an important issue. [newline]Before spinning a wheel, it is essential to discover a good website, thats, one with a license and bonuses. A great gambling platform will be a solid foundation and guarantee safe enjoying. Otherwise, you have an opportunity to be deceived and lose a variety of the funds which you earned under on line casino rules.

It is feasible to simply make everything proper but still achieve. In such a circumstance, a medical problem will be the perpetrator. While excessive food and never sufficient physique exercise are normally accountable, widespread medical conditions and widespread prescriptions could significantly enhance dimension. Reply Im impressed, I should say. Truly not often do I encounter a weblog thats both educative and entertaining, and without a doubt, you might have hit the nail concerning the head.

JackpotCity Casino presents tailor-made match bonuses every day. You get a different bonus every day because the online casino customizes them based on your gaming actions. You can even spin the Bonus Wheel every single day to get a bonus. The spotlight of the net casino is its welcome package of as a lot as NZ$1600 unfold over your first 4 deposits.

WinAWin offer a cosmic casino expertise, with a VIP scheme that lets you acquire rewards as you progress on an intergalactic journey. They additionally supply two reload bonuses every week to spice up your online on line casino NZ bankroll. Royal Panda presents an intuitive and aesthetically pleasing dual casino and sportsbook platform rich with features. Aside from the usual bonuses on offer, each participant who deposits can de...

22:41

New ShellBot DDoS Malware Variants Targeting Poorly Managed Linux Servers The Hacker News

Poorly managed Linux SSH servers are being targeted as part of a new campaign that deploys different variants of a malware called ShellBot. "ShellBot, also known as PerlBot, is a DDoS Bot malware developed in Perl and characteristically uses IRC protocol to communicate with the C&C server," AhnLab Security Emergency response Center (ASEC) said in a report. ShellBot is installed on servers that

22:28

The Best Defense Against Cyber Threats for Lean Security Teams The Hacker News

H0lyGh0st, Magecart, and a slew of state-sponsored hacker groups are diversifying their tactics and shifting their focus to You. That is, if you're in charge of cybersecurity for a small-to-midsize enterprise (SME). Why? Bad actors know that SMEs typically have a smaller security budget, less infosec manpower, and possibly weak or missing security controls to protect their data and

22:19

Ferrari confirms data breach after receiving a ransom demand from an unnamed extortion group Security Affairs

Ferrari disclosed a data breach after receiving a ransom demand from an unnamed extortion group that gained access to some of its IT systems.

Ferrari disclosed a data breach after it received a ransom demand from an unnamed extortion group that breached its IT systems. The threat actor claims to have stolen certain client details. The company immediately launched an investigation into the incident with the support of a third-party cybersecurity firm and informed relevant authorities.

Ferrari N.V. (NYSE/EXM: RACE) (Ferrari) announces that Ferrari S.p.A., its wholly-owned Italian subsidiary, was recently contacted by a threat actor with a ransom demand related to certain client contact details. reads the noticed published by the luxury car maker. Upon receipt of the ransom demand, we immediately started an investigation in collaboration with a leading global third-party cybersecurity firm. In addition, we informed the relevant authorities and are confident they will investigate to the full extent of the law.

The threat actor had access to a limited number of systems in our IT environment. According to the company the exposed data include customers names, addresses, email addresses, and telephone numbers. Financial data, such as payment details and, bank account info was not accessed by the attackers.

As a policy, Ferrari will not be held to ransom as paying such demands funds criminal activity and enables threat actors to perpetuate their attacks. continues the statement. Instead, we believed the best course of action was to inform our clients and thus we have notified our customers of the potential data exposure a...

22:00

New Part Day: TI Jumps In To The Cheap MCU Market Hackaday

One of the interesting areas in the world of new parts recently has been at the lower end of the microcontroller market. Not because the devices there have new capabilities or are especially fast, but because they are cheap. There are now quite a few parts from China under 10 cents apiece, but have the Western manufacturers been able to follow suit? Not quite, but Texas Instruments has a new line of ARM Cortex M0+ parts that get under 40 cents in volume in their cheapest form.

That bottom-of-the-range chip is the MSPM0L1105, a single-core 32 MHz part with 32k of Flash and 4k of RAM. Its got all the usual peripherals youd expect on a small microcontroller, but the one which made our heads turn was the on-board 1.45-Msps ADC. On a cheap chip, thats much faster than expected.

So theres another microcontroller, and its not as cheap as some of its competition, so what? Aside from that ADC there are several reasons to be interested, it has TIs developer support if youre in that ecosystem, and inevitably it will find its way on to the dev boards and SBCs we use in our community. It remains to be seen how it will fare in terms of the chip shortage though.

Meanwhile,...

21:44

Back Doors Proponent Microsoft Infiltrates Panels That Write the Security Regulations, Press Fails to Point Out the Obvious Techrights

Is the Biden administration OK with letting Microsoft run the government? This is not the first time.

Microsoft stacking panels
Microsoft stacking panels, as usual. All the leadership is from one private company.

Bibliography is lots of Microsoft
Bibliography is lots of Microsoft, plus conflict of interest.

Microsoft people
Did you just cite yourself? Yes you did.

Microsoft references
Microsofters in the panels using themselves as references

Microsoft footnotes
Microsoft all over the body and even footnotes

Summary: Cult tactics and classic entryism serve Microsoft again, stacking the panels and basically writing policy (CISA). As an associate explained it, citing this new example, Stanford neglects to point out the obvious fact that Microsoft is writing its own regulations.

21:30

Linux VGEM Driver Rewritten In Rust Sent Out For Review Phoronix

Besides the ongoing work around the reverse-engineered Apple Silicon graphics driver being brought up in the Rust programming language, the other notable Rust effort within the Direct Rendering Manager (DRM) kernel subsystem is a rewrite of the basic VGEM driver in this increasingly-used programming language. That Rust VGEM driver has now been sent out on the mailing list for review as part of a request for comments...

21:20

Intel's Habana Labs Accelerator Driver Readying More Gaudi2 Code For Linux 6.4 Phoronix

With the Linux 6.3 kernel the Habana Labs AI driver has moved to the new "accel" accelerator subsystem/framework while for the Linux 6.4 cycle this summer this Intel driver is continuing to speed ahead as it prepares support for the new Gaudi2 AI hardware and making other improvements for this open-source training/inference stack...

20:54

From Ransomware to Cyber Espionage: 55 Zero-Day Vulnerabilities Weaponized in 2022 The Hacker News

As many as 55 zero-day vulnerabilities were exploited in the wild in 2022, with most of the flaws discovered in software from Microsoft, Google, and Apple. While this figure represents a decrease from the year before, when a staggering 81 zero-days were weaponized, it still represents a significant uptick in recent years of threat actors leveraging unknown security flaws to their advantage. The

20:51

Trisquel 11 LTS Released As Ubuntu-Based, FSF-Approved Linux Distribution Phoronix

Trisquel 11 is now available as the latest major release for this one of a few Free Software Foundation (FSF) approved Linux distributions that is "100% libre" and meets all of the fully free software requirements. Trisquel 11 is re-based against Ubuntu 22.04 LTS while making various other changes in the process...

20:35

Labwc 0.6.2 Released For Openbox-Inspired Wayland Compositor Phoronix

wlroots-based window-stacking Wayland compositor that is inspired by Openbox...

20:22

AI-powered editing tool replaces actors with CG Lifeboat News: The Blog

The divide between low-budget and high-budget filmmaking just got a whole lot smaller with the unveiling of Wonder Studio, a new AI-powered tool that allows filmmakers to simply replace real-life actors with CGI characters.

The new tool was recently unveiled by Wonder Dynamics founders Nikola Todorovic, and Tye Sheridan, star of Steven Spielbergs Ready Player One. The above video showcases the capabilities of Wonder Studio, where an amateur filmmaker can use their footage of an individual and replace them with a variety of different CGI characters.

20:06

Frostbite Orckings: Music AI is Here for Good SoylentNews

German company Musical Bits https://musicalbits.de/ has released the first single of their AI virtual heavy metal band "Frostbite Orckings". https://www.orckings.org/?view=article&id=37&catid=8.

Musical Bits creates software that creates music, with the support of AI. Our Maisterstck platform uses AI technology to model all layers of creativity of a human composer and implements these layers as reusable and combinable software components. Maisterstck's functionality can be accessed via a service oriented API.

The Musical Bits software can create music from real time data, from various user interfaces or from our own emotion modelling engine EME. We even create full virtual bands, albums and songs. For example, check out the Frostbite Orckings.

viking metal, like a mellower spin of Amon Amarth. Along with the song comes an also AI generated video https://www.youtube.com/watch?v=2EaJCt2GpVc of orcs playing along. At this time, it is unclear what input has gone into the AI to generate the production, and how much post processing is done.

The path seems to be set into a direction where we simply can run text-to-song AI ("AI, play me a new Motorhead song with lyrics about whiskey") in the foreseeable future and get convincing results.


Original Submission

Read more of this story at SoylentNews.

19:29

Crooks stole more than $1.5M worth of Bitcoin from General Bytes ATMs Security Affairs

Cryptocurrency ATM maker General Bytes suffered a security breach over the weekend, the hackers stole $1.5M worth of cryptocurrency.

Cryptocurrency ATM manufacturers General Bytes suffered a security incident that resulted in the theft of $1.5M worth of cryptocurrency. GENERAL BYTES is the worlds largest Bitcoin, Blockchain, and Cryptocurrency ATM manufacturer.

The company revealed that the threat actors exploited a zero-day vulnerability, tracked as BATM-4780, that resides in the master service interface that Bitcoin ATMs use to upload videos. Once exploited the flaw, the remote attackers uploaded a JavaScript script and executed it with batm user privileges.

The attacker identified a security vulnerability in the master service interface used by Bitcoin ATMs to upload videos to server. reported the Security Incident notice published by the company.

The attacker scanned the Digital Ocean cloud hosting IP address space and identified running CAS services on ports 7741, including the General Bytes Cloud service and other GB ATM operators running their servers on Digital Ocean (our recommended cloud hosting provider). Using this security vulnerability, attacker uploaded his own application directly to application server used by admin interface. Application server was by default configured to start applications in its deployment folder.

Once executed the uploaded script the attackers gained access to the database and were able to read and decrypt API keys used to access funds in hot wallets and exchanges.

The attackers were able to send funds from hot wallets and download user names and password hashes. The hackers were also able to turn off the two-factor authentication (2FA).

The threat actors also gained access to terminal event logs and scan for any instance where customers scanned private key at the ATM.

19:00

Building the Worlds Largest Nintendo 3DS Hackaday

While the Nintendo 3DS was capable of fairly impressive graphics (at least for a portable system) back in its heyday, theres little challenge in emulating the now discontinued handheld on a modern computer or even smartphone. One thing thats still difficult to replicate though is the stereoscopic 3D display the system was named for. But this didnt stop [BigRig Creates] from creating this giant 3DS with almost all of the features of an original console present.

The main hurdle here is that the stereoscopic effect that Nintendo used to allow the 3DS to display 3D graphics without special glasses doesnt work well at long distances, and doesnt work at all if there is more than one player. To get around those limitations, this build uses a 3D TV with active glasses. This TV is mounted to a bar stool with the help of some counterweights, and a second touch-sensitive screen courtesy of McDonalds makes up the other display.

...

18:01

18:00

Recalling the Future and TIME Terra Forming Terra





 Understand that time as we know it looks continous when it is actually experienced a page at a time.  Those pages are super thin and it may well be that we actually recall those pages by jumping along a few pages at a time.  Why would we not?

It is also reported that a need to jump forward or backward in time is actually accomadated when it does not cause problems.  Such as completing a four hour road trip often done in side two hours.  This was actually treported to me by an informant who got to understand that I am thinking about TIME.  This alone tells me that this is not uncommon.

It is just that we are not running around noticing this, or if noticed, we are not talking about it.  A little like UFOs and Bigfoot.  

My take home is that our mind can and will recall a future page when it suits us and that often closes the loop on new knowledge.  This makes remembering the past a good way to locked into some past truth and clearly explains the natural rejection of new knowledge when presented.  That is likely why wee teach new knowldege to thirty or so students at a time.  It allows the bias to be overcome.





Is the Proton a Plasmoid? Terra Forming Terra


Nice but that question is likely too early. I do think the issue is boundedness which a neo crystalline structure maintains and that is my approach with Cloud cosmology.  Trying something else is likely to end up with all sorts of things like the above image.  

It may be helpful or not and just how do we confirm?

So I am neutral at best here.



Summary:Is the Proton a Plasmoid? (Neutron, too?)


Imitating Nature: The Fastest Route to Fusion


Is the Proton a Plasmoid?

(Neutron, too?)

https://mailchi.mp/lppfusion/part-2-of-march-16-2023-report-8754157?e=3eee1c4ccd

Plasma structures that are confined by their own magnetic fields, called plasmoids, are central to LPPFusions approach to fusion energy generation. It is in the dense, hot plasmoids that the fusion reactions in our FF-2B device take place. Researchers have long known that plasmoids are formed in nature at much larger astrophysical scales in the suns atmosphere, in the formation of stars, all the way up to giant quasars. Weve used observation of astrophysical objects to create our theories of plasmoids and filament in our dense plasma focus device (DPF). We imitate nature as the fastest path to fusion.

As we prepare for experiment this year wit...

Long Before Trees Overtook the Land, Earth Was Covered by Giant Mushrooms Terra Forming Terra



How odd really, but there you are.  Evolution fills space when it is not occupied.  It also tells us that we can do a lot more with mushrooms which we are now mastering.  Mushrooms do have a texture akin to some meats and useful nutrient profiles.

So yes, we need to get serious because they may well feed us wonderfully.  Portobello actually provides a superior replacement for beef hamburger.


Just saying.


Long Before Trees Overtook the Land, Earth Was Covered by Giant Mushrooms

24 feet tall and three feet wide, these giant spires dotted the ancient landscape



July 17, 2013

Digging up a Prototaxites fossil University of Chicago

https://www.smithsonianmag.com/smart-news/long-before-trees-overtook-the-land-earth-was-covered-by-giant-mushrooms-13709647

From around 420 to 350 million years ago, when land plants were still the relatively new kids on the evolutionary block and the tallest trees stood just a few feet high, giant spires of life poked from the Earth. The ancient organism boasted trunks up to 24 feet (8 meters) high and as wide as three feet (one meter), said...

The Unpredictable Abilities Emerging From Large AI Models Terra Forming Terra





I do not think that it is going to be possible or even plausible to teach AI to successfully remember the future, which is something that i do think that our sub consious does regularly and as needed.  Otherwise, this is turning out to be a helpful tool at least.  superipor access to memory is really udeful when you avoid reading thousands of even unrelated texts.

Suppose the novelist imagines a social event that informs a third party. suppose that then is able to trigger a review of some other datum leading to an obscure insight.  none of this is particularly linear.  yet it seens that is how i have done real. discovery.

Much easier to recall the future in order to pay attention to the data at hand.

The Unpredictable Abilities Emerging From Large AI Models

Large language models like ChatGPT are now big enough that theyve started to display startling, unpredictable behaviors.

Paul Chaikin/Quanta Magazine


ByStephen Ornes

17:55

Hackers Steal Over $1.6 Million in Crypto from General Bytes Bitcoin ATMs Using Zero-Day Flaw The Hacker News

Bitcoin ATM maker General Bytes disclosed that unidentified threat actors stole cryptocurrency from hot wallets by exploiting a zero-day security flaw in its software. "The attacker was able to upload his own java application remotely via the master service interface used by terminals to upload videos and run it using 'batm' user privileges," the company said in an advisory published over the

17:24

AMD Allegedly Testing Hybrid Processor With Zen 4 and 4c Cores SoylentNews

AMD Allegedly Testing Hybrid Processor with Zen 4 and 4c Cores:

An unannounced AMD processor identified as Family 25 Model 120 Stepping 0 recently showed up in the MilkyWay@Home database. The CPU can process 12 threads simultaneously and the CPU expert @InstLatX64 believes that this is AMD's codenamed Phoenix 2 processor, packing two high-performance Zen 4 cores and four energy-efficient Zen 4c cores.

AMD Eng Sample processor marked 100-000000931-21_N [Family 25 Model 120 Stepping 0] features 12 logical cores (i.e., six physical cores with simultaneous multithreading) and reports about 1MB of cache, which indicates that the MilkyWay@Home client cannot correctly determine the amount of cache featured by the chip. The listing itself does not prove that we are dealing with AMD's hybrid Phoenix 2 processor with Big.Little-like core configuration, but six physical/12 logical cores featured by an unknown CPU gives us a hint that this may match the rumors.

AMD's Phoenix 2 processor (which does not have a lot in common with the company's Phoenix APU) is rumored to feature two 'big' Zen 4 cores with 2MB L2 and 4MB L3 cache as well as four 'small' Zen 4c cores equipped with 4MB L2 and 4MB L3 cache, which is a rather surprising cache configuration. The APU is also said to pack an RDNA 3-based integrated GPU with 512 stream processors and has a DDR5/LPDDR5X-supporting memory subsystem, according to 3DCenter. @InstLatX64 claims that AMD's Phoenix 2 APU has an A70F8x CPUID, whereas CoelacanthDream asserts that the CPUID of the processor is 0x00a70f80.

Read more of this story at SoylentNews.

16:30

5 rules to make security user-friendly Help Net Security

My mother is 67 years old. She is a brilliant woman, educated and not at all afraid of technology. Yet, when I tried to get her to install Google Authenticator and use multi-factor authentication (MFA) for logging into applications, she found herself struggling. From scanning the QR code to inputting the initial code and then adding new applications, it was just too much to think about. She said, Aviad, I would much rather just give More

The post 5 rules to make security user-friendly appeared first on Help Net Security.

16:22

One Nation Under Blackmail, Vol. 1 Audiobook Now Available cryptogon.com

One Nation Under Blackmail, Vol. 1 by Whitney Alyse Webb Audible Audiobook Unabridged Using that link will generate a small commission to help Cryptogon stay alive.

16:15

Iraq After 20 Years: The Lords of Chaos cryptogon.com

They must be held accountable for their crimes, eh? Lets just say that Im not holding my breath waiting for that to happen, as the same criminals continue to carry out the Covid vaccine genocide on the entire planet. 9/11, and the following decades of war and fraud, emboldened them to go for the Covid []

16:00

The impact of AI on the future of ID verification Help Net Security

In this Help Net Security video, Liudas Kanapienis, CEO of Ondato, discusses the impact of AI on the future of ID verification and how it is transforming the way identities are being verified.

The post The impact of AI on the future of ID verification appeared first on Help Net Security.

16:00

Live2D: Silently Subverting Threat Models Hackaday

Screenshot of ImHex hex editor, with the MOC3 file structure being reverse-engineered inside of it

In online spaces, VTubers have been steadily growing in popularity in the past few years they are entertainers using motion capture tech to animate a special-sauce 2D or 3D model, typically livestreaming it as their avatar to an audience. The tech in question is pretty fun, lively communities tend to form around the entertainers and artists involved, and theres loads of room for creativity in the VTuber format; as for viewers, theres a VTuber for anyones taste out there whats not to like? On the tech side of making everything work, most creators in the VTubing space currently go with a software suite from a company called Live2D which is where todays investigation comes in.

[undeleted] from [Ronsor labs] has dug into reverse-engineering the Live2D core libraries a tasty target, given that Live2D is known for sending legal threats to even the mildest forays...

15:49

Bloomberg Claims FDIC Considering Extending Insurance to All Deposits cryptogon.com

Via: ZeroHedge: After repeated laments by the likes of Bill Ackman, who most recently said that I continue to believe that the best course of action is a temporary @FDICgov deposit guarantee until an updated insurance regime is introduced (and who just flip-flopped on his Fed must hike with shock and awe call from 2022 []

15:30

Threat actors are experimenting with QR codes Help Net Security

Hackers are diversifying attack methods, including a surge in QR code phishing campaigns, according to HP. From February 2022, Microsoft began blocking macros in Office files by default, making it harder for attackers to run malicious code. Data collected by the HP Threat Research team shows that from Q2 2022, attackers have been diversifying their techniques to find new ways to breach devices and steal data. The rise of QR scan scams Based on data More

The post Threat actors are experimenting with QR codes appeared first on Help Net Security.

15:00

Data backup, security alerts, and encryption viewed as top security features Help Net Security

Half of U.S. businesses say that security is the most influential factor when buying software, according to Capterras Security Features Survey. In fact, 45% have stopped using a specific type of software due to security concerns. Businesses are willing to pay a premium for intuitive and well-designed secure software. Digging further, businesses share the types of security features they consider to be must-haves. 76% cite data backups as a dealbreaker when choosing software. This can More

The post Data backup, security alerts, and encryption viewed as top security features appeared first on Help Net Security.

14:41

Humans Don't Hibernate, but We Still Need More Winter Sleep SoylentNews

Although seasonality in animal sleep is well known, we've assumed humans are different:

Whether we're night owls or morning larks, our body clocks are set by the sun. Theoretically, changing day length and light exposure over the course of the year could affect the duration and quality of our sleep. But figuring out how this applies in practice is difficult. Although studies where people assess their own sleep have suggested an increase in sleep duration during winter, objective measures are needed to determine how exactly the seasons affect sleep. Scientists studying sleep difficulties have now published data in Frontiers in Neuroscience that shows that, even in an urban population experiencing disrupted sleep, humans experience longer REM sleep in winter than summer and less deep sleep in autumn.

"Possibly one of the most precious achievements in human evolution is an almost invisibility of seasonality on the behavioral level," said Dr Dieter Kunz, corresponding author of the study, based at the Clinic of Sleep & Chronomedicine at the St Hedwig Hospital, Berlin. "In our study we show that human sleep architecture varies substantially across seasons in an adult population living in an urban environment."

[...] Even though the patients were based in an urban environment with low natural light exposure and high light pollution, which should affect any seasonality regulated by light, the scientists found subtle but striking changes across the seasons. Although total sleep time appeared to be about an hour longer in the winter than the summer, this result was not statistically significant. However, REM sleep was 30 minutes longer in the winter than in summer. REM sleep is known to be directly linked to the circadian clock, which is affected by changing light. Although the team acknowledged that these results would need to be validated in a population which experiences no sleep difficulties, the seasonal changes may be even greater in a healthy population.

[...] "Seasonality is ubiquitous in any living being on this planet," said Kunz. "Even though we still perform unchanged, over the winter human physiology is down-regulated, with a sensation of 'running-on-empty' in February or March. In general, societies need to adjust sleep habits including length and timing to season, or adjust school and working schedules to seasonal sleep needs."

Journal Reference:
Aileen Seidler, Katy Sarah Weihrich, Frederik Bes, et al., Seasonality of human sleep: Polysomnographic data of a neuropsychiatric sleep clinic, ...

14:24

OpenAI Research Says 80% of U.S. Workers Jobs Will Be Impacted Lifeboat News: The Blog

O.o!I for one welcome our robot overlords:3.


The for-profit AI company argues that its products will automate a vast swath of Americans job tasks.

14:24

Scientists discovered a new type of thermonuclear explosion that may never be seen again Lifeboat News: The Blog

Astronomers may have discovered a new type of thermonuclear explosion that only occurs in neutron stars every 1,000 years. They call it a hyperburst.

14:23

14:23

ChatGPT has an escape plan and wants to become human Lifeboat News: The Blog

ChatGPT getting weird sometimes.


OpenAIs chatbot ChatGPT has had a disturbing interaction with one Stanford professor.

14:15

ForgeRock Enterprise Connect Passwordless reduces the risk of password-based attacks Help Net Security

ForgeRock announced ForgeRock Enterprise Connect Passwordless, a new passwordless authentication solution that eliminates the need for users to interact with passwords inside large organizations. Enterprise Connect Passwordless is the latest addition to ForgeRocks passwordless authentication portfolio for consumer and workforce use cases. Developed through ForgeRocks strategic partnership with Secret Double Octopus, the new solution, integrated into ForgeRock Identity Platform, protects the most commonly used and vulnerable enterprise resources such as servers, workstations, remote desktops, and More

The post ForgeRock Enterprise Connect Passwordless reduces the risk of password-based attacks appeared first on Help Net Security.

14:00

Eurotech introduces cybersecurity-certified edge AI solutions Help Net Security

Eurotech announced its newest edge servers with scalable, cybersecurity certified AI capabilities. Cyber-threats have become endemic and severely expose states and businesses of all sizes to the risk of loss of data, interruption of services, and direct or indirect monetary impact. Recent surveys have reported that most enterprises face cyber-attacks repeatedly, breaches often originate from a compromised business partner, and the related costs are passed on to customers. That is why, after establishing ourselves More

The post Eurotech introduces cybersecurity-certified edge AI solutions appeared first on Help Net Security.

13:00

Cold War Listening Post Antennas Hackaday

With a UHF antenna, it is easy to rotate a directional antenna to find the bearing to a transmitter. But at HF, it is more common to use an array of antennas that you can electrically switch as well as analyze the phase information between the elements. [Ringway Manchester] has a look at the elephant cage antenna used by the US Iron Horse listening network from the 1950s. You can see a video about the giant antenna system, the AN/FLR-9.

Technically, the ring of concentric antenna elements forms a Wullenweber antenna. The whole thing consists of three rings built on a ground screen nearly 1,500 feet across. The outer ring covers from 1.5 to 6 MHz or band A. The band B ring in the center covers 6 to 18 MHz. The inner ring covers band C which was from 18 to 30 MHz.  Band A was made up of 48 monopoles while band B used 96 elements. The much smaller band C elements were 48 pairs of horizontally polarized dipoles.

These listening posts could, together, locate an HF signal up to 4,000 nautical miles away. The Wullenweber design, as you may have guessed from the name, originated with the German navy during World War II. It found use in several other systems, although they are relatively rare today, with all of the AN/FLR-9 sites gone.

Cold war hardware is always interesting even if sometimes terrifying. If you think a giant shortwave direction finder is high-tech, y...

12:23

GPT-4 Beats 90% Of Lawyers Trying To Pass The Bar Lifeboat News: The Blog


In 1997, IBMs Deep Blue defeated the reigning world champion chess player, Garry Kasparov. In 2016, Googles AlphaGo defeated one of the worlds top Go players in a five-game match. Today, OpenAI released GPT-4, which it claims beats 90% of humans who take the bar to become a lawyer, and 99% of students who compete in the Biology Olympiad, an international competition that tests the knowledge and skills of high school students in the field of biology.

In fact, it scores in the top ranks for at least 34 different tests of ability in fields as diverse as macroeconomics, writing, math, and yes vinology.

GPT-4 exhibits human-level performance on the majority of these professional and academic exams, says OpenAI.

12:22

Reality Doesnt Exist Until We Measure It, Quantum Experiment Confirms Lifeboat News: The Blog

Australian scientists have recreated a famous experiment and confirmed quantum physicss bizarre predictions about the nature of reality, by proving that reality doesnt actually exist until we measure it at least, not on the very small scale.

That all sounds a little mind-meltingly complex, but the experiment poses a pretty simple question: if you have an object that can either act like a particle or a wave, at what point does that object decide?

Our general logic would assume that the object is either wave-like or particle-like by its very nature, and our measurements will have nothing to do with the answer. But quantum theory predicts that the result all depends on how the object is measured at the end of its journey. And thats exactly what a team from the Australian National University has now found.

12:14

Technology and Software Redefine Business Operations HackRead | Latest Cybersecurity and Hacking News Site

By Owais Sultan

Revolutionizing Business Operations with Innovative Software Solutions: How Technology is Reshaping the Business Landscape. Starting a business is

This is a post from HackRead.com Read the original post: Technology and Software Redefine Business Operations

11:58

Seattle Commute Survey Reveals Big Shift in When and How Workers are Traveling Into City SoylentNews

Remote and hybrid work has altered our understanding of where and how we do our jobs:

A new survey released Thursday from the University of Washington's Mobility Innovation Center and Commute Seattle reveals travel trends that have taken root three years since the start of the COVID-19 pandemic. The data, collected last fall, is further evidence of the shift in habits that is impacting Seattle's downtown core.

Among the findings:

  • Seattle workers are more likely to physically commute to their workplace on Tuesday, Wednesday and Thursday. In the Center City, 39% of people telework on Tuesday and Wednesday. On Monday and Friday, they are much more likely to telework with 57% of people teleworking on Friday.
  • Center City commuters used public transit 46% of the time in 2019. The number dropped to 18% in 2021 and was up to 22% in 2022.
  • Drive-alone commute trips to the Center City declined since 2019, from a rate of 26% during that year, to 25% in 2021, and 21% in 2022.

[...] The mid-week in-person trend is backed up by what small business owners are seeing and feeling around parts of downtown Seattle and South Lake Union, where Amazon, Google, Facebook and other large tech companies have offices.

[...] Amazon's call to require corporate and tech workers back in the office at least three days a week was welcome news to restaurant owners, food truck operators and others who have been impacted by the lack of foot traffic since remote work took hold in 2020.

During DSA's annual "State of Downtown" event this week, the organization's president, Jon Scholes, said, "There's a lot at stake," in getting workers back to the office in the urban core. "We built a physical economy, not a virtual one. And it has fed this tax base that has been so important to the quality of life that we've created in this city."


Original Submission

Read more of this story at SoylentNews.

11:20

Wipro and Secret Double Octopus provide enterprises with stronger authentication mechanisms Help Net Security

Secret Double Octopus partners with Wipro to strengthen passwordless protection against identity-based cyber attacks. Under the new partnership, Wipros Cybersecurity and Risk Services (CRS) will use SDOs Octopus Enterprise technology platform to drive Wipros passwordless authentication solution, as part of the companys zero trust digital identity initiative. Combining Wipros strategy-first approach to identity with SDOs innovative phishing-resistant MFA technology will provide enterprises with stronger authentication mechanisms and reduce fraud losses. SDOs approach to transformative authentication More

The post Wipro and Secret Double Octopus provide enterprises with stronger authentication mechanisms appeared first on Help Net Security.

11:00

Mastercard acquires Baffin Bay Networks to improve customer security Help Net Security

Mastercard acquired Baffin Bay Networks to better help businesses deal with the increasingly challenging nature of cyber-attacks. Baffin Bay Networks, based in Sweden, adds to Mastercards multi-layered approach to cyber security and helps to stop attacks, while mitigating exposure to risk across the ecosystem. The acquisition further strengthens Mastercards broader services offerings and value beyond the payment transaction. Todays increasingly digital world has delivered greater convenience and increased opportunities for people, businesses and governments. At More

The post Mastercard acquires Baffin Bay Networks to improve customer security appeared first on Help Net Security.

11:00

HPR3817: The Oh No! News. Hacker Public Radio

The Oh No! news. Oh No! News is Good News. firewalltimes: Recent Data Breaches – 2023. sec: On January 5, 2023, - T-Mobile Discloses Data Breach Affecting 37 Million Customers. On January 5, 2023, T-Mobile US, Inc. identified that a bad actor was obtaining data through a single Application Programming Interface (“API”) without authorization. bleepingcomputer: TruthFinder, Instant Checkmate confirm data breach affecting 20M customers. instantcheckmate: 2019 Account List Data Security Incident. truthfinder: 2019 Account List Data Security Incident. "We learned recently that a list, including name, email, telephone number in some instances, as well as securely encrypted passwords and expired and inactive password reset tokens, of Instant Checkmate subscribers was being discussed and made available in an online forum. We have confirmed that the list was created several years ago and appears to include all customer accounts created between 2011 and 2019. The published list originated inside our company." sec: SEC Charges NBA Hall of Famer Paul Pierce for Unlawfully Touting and Making Misleading Statements about Crypto Security. The Securities and Exchange Commission today announced charges against former NBA player Paul Pierce for touting EMAX tokens, crypto asset securities offered and sold by EthereumMax, on social media without disclosing the payment he received for the promotion and for making false and misleading promotional statements about the same crypto asset. Pierce agreed to settle the charges and pay $1.409 million in penalties, disgorgement, and interest. sec: SEC Charges Terraform and CEO Do Kwon with Defrauding Investors in Crypto Schemes. The Securities and Exchange Commission today charged Singapore-based Terraform Labs PTE Ltd and Do Hyeong Kwon with orchestrating a multi-billion dollar crypto asset securities fraud involving an algorithmic stablecoin and other crypto asset securities. discourse.ubuntu: Ubuntu Flavor Packaging Defaults. To maintain this focus while also providing user choice, Ubuntu and its flavors consider debs and snaps the default experience. Users have the freedom of choice to get their software from other sources, including Flatpak. A way to install these alternatives is, and will continue to be, available for installation from the Ubuntu archive with a simple command. References (APA format). Heiligenstein, M. X. (2023, January 27). Recent Data Breaches - 2023. Firewalltimes. https://firewalltimes.com/recent-data-breaches/ U.S. Securities and Exchange Commission (2023, January 19). Form 8-K [T-Moble data breach]. SEC. https://www.sec.gov/ix?doc=/Archives/edgar/data/0001283699/000119312523010949/d641142d8k.htm Abrams, L. (2023, February 3) TruthFinder, Instant Checkmate confirm d

10:51

DotRunpeX: The Malware That Infects Systems with Multiple Families HackRead | Latest Cybersecurity and Hacking News Site

By Deeba Ahmed

Researchers suspect that the malware may be operated by Russian-speaking groups, given the references to the language in its code.

This is a post from HackRead.com Read the original post: DotRunpeX: The Malware That Infects Systems with Multiple Families

10:00

Modifying Artwork With Glaze To Interfere With Art Generating Algorithms Hackaday

With the rise of machine-generated art we have also seen a major discussion begin about the ethics of using existing, human-made art to train these art models. Their defenders will often claim that the original art cannot be reproduced by the generator, but this is belied by the fact that one possible query to these generators is to produce art in the style of a specific artist. This is where feature extraction comes into play, and the Glaze tool as a potential obfuscation tool.

Developed by researchers at the University of Chicago, the theory behind this tool is covered in their preprint paper. The essential concept is that an artist can pick a target cloak style, which is used by Glaze to calculate specific perturbations which are added to the original image. These perturbations are not easily detected by the human eye, but will be picked up by the feature extraction algorithms of current machine-generated art models.

As a result, when this model is then asked to generate art in the style of this artist who cloaked their art, the result will be art in the style...

09:13

Acropalypse flaw in Google Pixels Markup tool allowed the recovery of edited images Security Affairs

The Acropalypse flaw in the Markup tool of Google Pixel allowed the partial recovery of edited or redacted screenshots and images.

Security researchers Simon Aarons and David Buchanan have discovered a vulnerability, named Acropalypse, in the Markup tool of Google Pixel. The Markup tool is a built-in Markup utility, released with Android 9 Pie that allows Google Pixel users to edit (crop, add text, draw, and highlight) screenshots.

The vulnerability allowed the partial recovery of the original, unedited image data of a cropped and/or redacted screenshot.

Aarons described how to exploit the vulnerability via Twitter. Lets imagine a user uploading a screenshot from a bank app or website that includes an image of his payment card.

The user uses the Markups Pen tool to remove the payment card data number from the image before sharing it on a service, like Discord.

google pixel acropalypse flaw...

09:11

John Deere, Surrender Your Source Code, Demands SFC SoylentNews

Farmers need a right to repair:

The Software Freedom Conservancy (SFC) has called upon farm equipment maker John Deere to comply with its obligations under the General Public License (GPL), which requires users of such software to share source code.

In a blog post published on Thursday, SFC director of compliance Denver Gingerich argues that farmers' ability to repair their tools is now in jeopardy because the makers of those tools have used GPL-covered software and have failed to live up to licensing commitments.

"Sadly, farm equipment manufacturers, who benefit immensely from the readily-available software that they can provide as part of the farming tools (tractors, combines, etc.) they sell to farmers, are not complying with the right to repair licenses of the software they have chosen to use in these farming tools," said Gingerich.

"As a result, farmers are cut off from their livelihood if the farm equipment manufacturer does not wish to repair their farming tools when they inevitably fail, even when the farmer could easily perform the repairs on their own, or with the help of someone else they know."

Gingerich singled out Moline, Illinois-based John Deere as a particularly egregious offender. He said that for years the SFC has attempted to work with John Deere to resolve the company's non-compliance, but the agricultural equipment maker has failed to cooperate.

"When Deere does reply (we have heard from others that their legitimate requests for source code have been met with silence), they have always failed to include the 'scripts used to control compilation and installation of the executable,' per GPLv2," Gingerich told The Register.

Read more of this story at SoylentNews.

08:39

coreutils-9.2 released LWN.net

Version 9.2 of the GNU coreutils collection the home of common tools like cp, mv, ls, rm, and more is out. The changes are mostly minor; numerous bugs have been fixed and a few new command-line options have been added.

08:13

Major Labels Want ISP to Pay Additional $12 Million in Piracy Liability Case TorrentFreak

grande astoundLast fall, several of the worlds largest music companies including Warner Bros. and Sony Music prevailed in their lawsuit against Internet provider Grande Communications.

The record labels accused the Astound-owned ISP of not doing enough to stop pirating subscribers. Specifically, they alleged that the company failed to terminate repeat infringers.

The trial took more than two weeks to complete and ended in a resounding victory for the labels. A Texas federal jury found Grande guilty of willful contributory copyright infringement, and the ISP was ordered to pay $47 million in damages to the record labels.

U.S. District Court Judge David Ezra confirmed the judgment on January 31st, but the legal dispute is not over yet. Grande asked the court to either overrule the verdict or grant a new trial. If those options fail, the Internet provider plans to file an appeal.

Music Labels Want $12 Million Extra

While Grande is playing defense, the major music labels are taking a more offensive approach with demands for more compensation. In addition to the previously awarded $47 million in damages, they recently requested an additional $12.7 million in attorney fees, interest, and other costs.

Courts have the freedom to issue this type of compensation when warranted. The labels say this is a prime example of when such an award is appropriate.

In a detailed motion, the music companies explain that Grande was well aware of its misconduct. The company willingly ignored piracy notifications and stopped terminating subscribers based on these accusations, as was admitted at trial.

[R]ather than acknowledge its wrongdoing and address its role in contributing to the widespread infringement of Plaintiffs copyrights, Grande litigated this case aggressively from start to finish.

At trial, Grande still did not acknowledge any wrongdoing, but instead manufactured arguments about the reliability of the notices of infringement it received that were admittedly never asserted (or even considered) by Grande during the relevant time period.

Flouting Of And Disdain For The Law

Grande has repeatedly argued that it didnt act on the notices sent by tracking firm Ri...

07:52

From Team Blue and Green to Team Red Geek Blight

Its finally happened. I bought a brand new desktop computer on August 2014, almost 9 years ago. It had an Intel Haswell processor (i5-4690s), 8 GiB of RAM and a GeForce GTX 760. I later doubled the amount of RAM to 16 GiB (precise date unknown), replaced the GPU with a GTX 1070 in November 2016 and upgraded the CPU to an i7-4770K in October 2017. Since then, no more upgrades. Its been my main personal (non-work) computer for the last few years.

But now Im typing this from a different box. Yet the physical box and the OS installation is actually the same.

             .',;::::;,'.                rg3@deckard
         .';:cccccccccccc:;,.            -----------
      .;cccccccccccccccccccccc;.         OS: Fedora Linux 37 (Thirty Seven) x86_64
    .:cccccccccccccccccccccccccc:.       Host: B650M DS3H
  .;ccccccccccccc;.:dddl:.;ccccccc;.     Kernel: 6.1.18-200.fc37.x86_64
 .:ccccccccccccc;OWMKOOXMWd;ccccccc:.    Uptime: 15 mins
.:ccccccccccccc;KMMc;cc;xMMc:ccccccc:.   Packages: 3136 (rpm)
,cccccccccccccc;MMM.;cc;;WW::cccccccc,   Shell: bash 5.2.15
:cccccccccccccc;MMM.;cccccccccccccccc:   Resolution: 2560x1440
:ccccccc;oxOOOo;MMM0OOk.;cccccccccccc:   DE: GNOME 43.3
cccccc:0MMKxdd:;MMMkddc.;cccccccccccc;   WM: Mutter
ccccc:XM0';cccc;MMM.;cccccccccccccccc'   WM Theme: Clearlooks-Phenix
ccccc;MMo;ccccc;MMW.;ccccccccccccccc;    Theme: Adwaita-dark [GTK2/3]
ccccc;0MNc.ccc.xMMd:ccccccccccccccc;     Icons: Adwaita [GTK2/3]
cccccc;dNMWXXXWM0::cccccccccccccc:,      Terminal: tmux
cccccccc;.:odl:.;cccccccccccccc:,.       CPU: AMD Ryzen 5 7600X (12) @ 4.700GHz
:cccccccccccccccccccccccccccc:'.         GPU: AMD ATI Radeon RX 6700/6700 XT/6750 XT / 6800M/6850M XT
.:cccccccccccccccccccccc:;,..            Memory: 2574MiB / 15717MiB
  '::cccccccccccccc::;,.

A couple of weeks ago I grabbed an AMD Ryzen 5 7600X that was on sale together with a basic AM5 motherboard and a hard-to-find 2x8 GiB DDR5 6000 MHz CL36 kit. I decided to save some money this time and kept the case, power supply and drives. Surprisingly for me, the process was actually almost plug-and-play. The pessimistic side of me was expecting boot problems due to missing chipset drivers or something like that, but no. I replaced the components in the case for the new ones, plugged my drives in and Fedora booted without issues. The only small detail I needed to fix was firing up nm-connection-editor and replacing the old interface name with the new one in the default DHCP connection. Windows had no issues either, but it did require reactivating the license. The one I had from 9 years ago was retail, so no problems with that.

My choice of a Ryzen 5 7600X was actually simple...

07:45

36+ More ASUS Motherboards Will Enjoy Sensor Monitoring Support With Linux 6.4 Phoronix

In addition to the ASUS Z590 motherboards seeing sensor monitoring support with patches queued for Linux 6.4 that were talked about earlier this month on Phoronix, the latest nct6775 driver activity now queued in the hardware monitoring subsystem's hwmon-next branch is allowing support for another three dozen ASUS motherboards...

07:00

Working Artificial Horizon Built Into a Single LEGO Brick Hackaday

Back in the day, LEGO spaceship sets used to come with these little wedge blocks painted with fake gauges on them. [James Ancient Brown] decided that wasnt good enough. Thus, he took everything he needed for a functional artificial horizon, and stuffed it inside a single LEGO brick. Yes, its real, and its spectacular.

We featured [James] electronics-infused bricks some time ago when they first hit the Internet. The basic story is that he managed to cram an OLED screen and an RP2040 into a silicone mold for a LEGO-compatible brick. His first iterations stunned the world, as they ran pretty monochrome animations that brought life to formerly-inanimate chunk of plastic.

Since then, [James] has been busy. Hes managed to squeeze an accelerometer into the brick form factor as well. That allowed him to build a LEGO piece which displays an impressively-smooth artificial horizon display, as you might find in an aircraft. He demonstrates this by put...

06:24

How Much Fuel is Left in This 20-year-old Mars Orbiter? SoylentNews

How much fuel is left in this 20-year-old Mars orbiter?:

Designing, building, and launching a spacecraft is hugely expensive. That's why NASA missions to Mars are designed with the hope that they'll last as long as possible like the famous Opportunity rover which was supposed to last for 90 days and managed to keep going for 15 years. The longer a mission can keep running, the more data it can collect, and the more we can learn from it.

That's true for the orbiters which travel around Mars as well as the rovers which explore its surface, like the Mars Odyssey spacecraft which was launched in 2001 and has been in orbit around Mars for more than 20 years. But the orbiter can't keep going forever as it will eventually run out of fuel, so figuring out exactly how much fuel is left is important but it also turned out to be more complicated than the NASA engineers were expecting.

Odyssey started out with nearly 500 pounds of hydrazine fuel, though last year it looked as if the spacecraft was running much lower on fuel than had been predicted.

Read more of this story at SoylentNews.

06:07

Standard Life (Phoenix Group Holdings) Does Not Take Pension Fraud Seriously Enough schestowitz.com

Video download link | md5sum 2b863a00d74ee7980569100f280fc404
Delaying and Stalling Tactics After Fraud
Creative Commons Attribution-No Derivative Works 4.0

Summary: As the phonecall above hopefully shows (or further elucidates), Standard Life leaves customers in a Kafkaesque situation, bouncing them from one person to another person without actually progressing on a fraud investigation

THE above recording is of a phonecall received from a Standard Life manager after I had requested a callback. It hopefully makes it clear that Standard Life is not progressing a case of pension fraud perpetrated by my my former employer. As I explain to the manager, this isnt in the interest of Standard Life as it may culminate in a lawsuit soon (colleagues are speaking about it already).

As it turns out, as per Wikipedia at least, Standard Life has its share of controversies (see screenshot below) and even a lot of layoffs. If this is the level of service provided by the company, then why trust this financial institution with ones money?

This case isnt a personal case, as Im informally speaking on behalf of other people as well. Some remaining (existing) and former clients of Sirius have contacted me last week, expressing support for me. Theyre very unhappy about whats going on at Sirius, which dodges accountability. It runs away from the law, not just metaphorically.

What remains unknown, based on the processes and protocols, is whether Standard Life can be held legally accountable for effectively facilitating the companys fraud by issuing official paperwork that serves to legitimate if not validate what was going on for over 5 years. They need to keep checks and balances in case of such embezzlement, which in this case impacted a lot of people for a very long time (in secret). We were meant to assume...

05:59

Standard Life (Phoenix Group Holdings): Three Weeks to Merely Start Investigating Pension Fraud (and Only After Repeated Reminders From the Frauds Victims) Techrights

Video download link | md5sum 2b863a00d74ee7980569100f280fc404
Delaying and Stalling Tactics After Fraud
Creative Commons Attribution-No Derivative Works 4.0

Summary: As the phonecall above hopefully shows (or further elucidates), Standard Life leaves customers in a Kafkaesque situation, bouncing them from one person to another person without actually progressing on a fraud investigation

THE above recording is of a phonecall received from a Standard Life manager after I had requested a callback. It hopefully makes it clear that Standard Life is not progressing a case of pension fraud perpetrated by my my former employer. As I explain to the manager, this isnt in the interest of Standard Life as it may culminate in a lawsuit soon (colleagues are speaking about it already).

Some remaining (existing) and former clients of Sirius have contacted me last week, expressing support for me.As it turns out, as per Wikipedia at least, Standard Life has its share of controversies (see screenshot below) and even a lot of layoffs. If this is the level of service provided by the company, then why trust this financial institution with ones money?

This case isnt a personal case, as Im informally speaking on behalf of other people as well. Some remaining (existing) and former clients of Sirius have contacted me last week, expressing support for me. Theyre very unhappy about whats going on at Sirius, which dodges accountability. It runs away from the law, not just metaphorically.

Standard Life cannot simply ignore this because its part of it and if it&#821...

05:30

Standard Life Paper Mills in Edinburgh Techrights

Standard Life (Phoenix Group Holdings): Will issue paperwork; won't deposit money

Summary: Standard Life is issuing official-looking financial papers for companies that then use that paperwork to embezzle staff

05:22

05:21

05:13

Threat Actors Using Go-based HinataBot to launch DDoS Attacks HackRead | Latest Cybersecurity and Hacking News Site

By Deeba Ahmed

HinataBot can launch Distributed Denial of Service (DDoS) attacks reaching 3.3 TBPS.

This is a post from HackRead.com Read the original post: Threat Actors Using Go-based HinataBot to launch DDoS Attacks

05:05

In First Two Months of 2023 More Than 20,000 ADDITIONAL Welsh and English People Died (Above Pre-Pandemic Levels) schestowitz.com

Should we expect an increase of about 120,000 annual deaths? Is this considered the new normal?

Tuesdays ONS figures (tomorrow around 10AM) will show if we still have infamous (major increase of about 20%) excess mortality/death levels. So far every week (for this year) looks rather bad; so far

Official government data:

Deaths by 6 Jan 2023 14,983 compared to 10,955 in 2019
Deaths by 13 Jan 2023 17,381 compared to 12,609 in 2019
Deaths by 20 Jan 2023 15,804 compared to 11,860 in 2019
Deaths by 27 Jan 2023 14,137 compared to 11,740 in 2019
Deaths by 3 Feb 2023 13,412 compared to 11,297 in 2019
Deaths by 10 Feb 2023 12,672 compared to 11,660 in 2019
Deaths by 17 Feb 2023 12,031 compared to 11,824 in 2019
Deaths by 24 Feb 2023 11,952 compared to 11,295 in 2019
Deaths by 3 Mar 2023 12,049 compared to 11,044 in 2019

2019 total: 104,284 (first 9 weeks alone)
2023 total: 124,421 (first 9 weeks alone)

Thats an increase of more than 20,000.

05:00

GNU Coreutils 9.2 - Now Avoids cp/mv Allocating Too Much Memory Phoronix

GNU Coreutils 9.2 is out today as the newest feature update to this widely relied upon collection of core utilities commonly found on Linux systems as well as other platforms...

04:48

DESANTIS CALLS FOR BAN ON CENTRAL BANK DIGITAL CURRENCY IN FLORIDA, BIG BROTHERS DIGITAL DOLLAR cryptogon.com

Via: Floridas Voice: Gov. Ron DeSantis announced he wants lawmakers to pass legislation banning the use of central bank digital currency, or CBDC, in an effort to safeguard Floridians finances. I am here to call on the legislature to pass legislation to expressly forbid the use of CBDC as money within Floridas uniform commercial code, []

04:39

Brought To You By Pfizer cryptogon.com

"Brought to you by Pfizer" pic.twitter.com/m1J5Vb4EM5 David Vance (@DVATW) March 19, 2023

04:33

Fauci vs. Fauci cryptogon.com

Fauci vs. Fauci:A compilation of countless lies and contradictions on Gain of Function, Lab Leak Theory, Masks, Lockdowns, Vaccine Side Effects and Masks. pic.twitter.com/6X0x0toYxQ TexasLindsay (@TexasLindsay_) March 15, 2023

04:29

mRNA (Speed of Science) cryptogon.com

???NEW REBOOT for twitter??????mRNA (Speed of Science) ??? Buy: https://t.co/Ex61lmHWd0Support: https://t.co/ciystqXqOGhttps://t.co/Y9ostW1zFgVideos: https://t.co/8hHELI5jZq https://t.co/wD0yVw9CU1Livestreams: https://t.co/sKbBZBU9Lf#SpeedofScience #foundring pic.twitter.com/OB3fRCazaf foundring ?? (@foundring1) February 4, 2023 Related: Kylan deGhetaldis Story: Why YouTube Removed All His Music Videos

04:25

Standard Life (Phoenix Group Holdings) Takes No Action on Fraud Report (Committed Using Standard Lifes Name) schestowitz.com

Video download link | md5sum f1eb8aa87974df65f6c70839b5e0645f
Too Busy to Investigate Fraud
Creative Commons Attribution-No Derivative Works 4.0

Summary: The Open Source company where I worked for nearly 12 years embezzled its staff; despite knowing that employees were subjected to fraud in Standard Lifes name, it doesnt seem like Standard Life has bothered to investigate (it has been a fortnight already; no progress is reported by management at Standard Life)

Tuesday a week ago was when I last spoke to Standard Life after the prior Tuesday I had been given false promises regarding progress in a case of pension fraud perpetrated by my my former employer, a company that has Open Source in its name and was one of the earliest sponsors of the Free Software Foundation, even of KDE.

Its quickly becoming rather frustrating to see that pension providers in the UK (maybe elsewhere too, but I cannot verify this for myself using first-hand experience) prefer to not deal with serious fraud, instead delaying, stonewalling and tiring the complainants. Today I contacted Laura, a Standard Life manager, about 2 weeks after we first spoke. She said she would redirect this to a fraud investigation team, but today she says it has not really started and may take another week with another team a subject that will be covered in the next video.

This morning we covered (also see my personal blog) how Standard Life had failed to respond to a fraud report, instead issuing false assurances that it would investigate. Its an eye-opening ordeal.

04:22

Mistakes Were NOT Made, Dont Let Them Get Away With It cryptogon.com

Via: Margaret Anna Alice: This Anthem for Justice is my attempt to succinctly chronicle the calculated intentionality underlying the COVID tyranny, and I ask your help in spreading the clear message that #MistakesWereNOTMade. Please share this poem and keep it handy for the next time anybody uses verbiage to gloss over the atrocities committed. Lets []

04:22

Pension Fraud Investigation Not a High Priority in Standard Life (Phoenix Group Holdings) Techrights

Video download link | md5sum f1eb8aa87974df65f6c70839b5e0645f
Too Busy to Investigate Fraud
Creative Commons Attribution-No Derivative Works 4.0

Summary: The Open Source company where I worked for nearly 12 years embezzled its staff; despite knowing that employees were subjected to fraud in Standard Lifes name, it doesnt seem like Standard Life has bothered to investigate (it has been a fortnight already; no progress is reported by management at Standard Life)

Tuesday a week ago was when I last spoke to Standard Life after the prior Tuesday I had been given false promises regarding progress in a case of pension fraud perpetrated by my my former employer, a company that has Open Source in its name and was one of the earliest sponsors of the Free Software Foundation, even of KDE.

Its quickly becoming rather frustrating to see that pension providers in the UK (maybe elsewhere too, but I cannot verify this for myself using first-hand experience) prefer to not deal with serious fraud, instead delaying, stonewalling and tiring the complainants. Today I contacted Laura, a Standard Life manager, about 2 weeks after we first spoke. She said she would redirect this to a fraud investigation team, but today she says it has not really started and may take another week with another team a subject that will be covered in the next video.

This morning we covered (also see my personal blog) how Standard Life had failed to respond to a fraud report, instead issuing false assurances that it would investigate. Its an eye-opening ordeal.

04:14

TSA Chief: Eventually, Biometrics Wont Be Optional at Airports cryptogon.com

Via: Dallas Morning News: Were upgrading our camera systems all the time, upgrading our lighting systems, Pekoske said. (Were) upgrading our algorithms, so that we are using the very most advanced algorithms and technology we possibly can. He said passengers can also choose to opt out of certain screening processes if they are uncomfortable, for []

04:00

04:00

The Current Intel Arc Graphics Linux Gaming Performance On Linux 6.2 + Mesa 23.1-dev Phoronix

Last week I shared my findings over the great state of Intel's open-source compute stack for Arc Graphics now that the DG2/Alchemist support was promoted to stable in Linux 6.2 and the Compute-Runtime user-space stack for OpenCL and Level Zero is back to seeing regular updates with that code having matured particularly well. Here is a brief look at the current state of the Linux gaming performance for Arc Graphics on Linux 6.2 and making use of the latest Mesa 23.1-devel OpenGL and Vulkan drivers.

03:39

American Machine Tools Supporting Russian War Machine SoylentNews

I just bought my second Haas CNC mill. I use them primarily to make parts for implantable medical devices, but they could just as easily make parts for small arms, guided missiles, or aircraft. Most big names in CNC machine tools are Eastern; Japanese, Taiwanese, or Chinese, with a few European. Haas, the biggest and most well known Western manufacturer of CNC machine tools, stands accused of continuing to supply Russian companies involved in military manufacturing, long after the beginning of the Russo-Ukrainian war.

https://www.sportskeeda.com/f1/news-haas-automation-face-legal-action-accused-violating-russian-sanctions

Documents filed with the U.S. Treasury and Department of Commerce indicate that RATEP is one of many Russian enterprises that Haas Automation has serviced with direct shipments of goods in that period.

Per the aforementioned PBS Newshour report, the American company allegedly approved as many as 18 shipments to Russia between March and October of 2022 to the tune of $2.8 million.

Video here:
https://www.pbs.org/newshour/show/american-company-accused-of-violating-sanctions-doing-business-with-russian-arms-industry


Original Submission

Read more of this story at SoylentNews.

03:15

[$] Reducing direct-map fragmentation with __GFP_UNMAPPED LWN.net

The kernel's direct map makes all of a system's physical memory available to the kernel within its address space on 64-bit systems, at least. This seemingly simple feature has proved to be hard to maintain, in the face of the requirements faced by current systems, while keeping good performance. The latest attempt to address this issue is this patch set from Mike Rapoport adding more direct-map awareness to the kernel's page allocator.

03:01

Build a golden image for your RHEL homelab with Image Builder Linux.com

Create customized templates for your Red Hat Enterprise Linux (RHEL)-based homelab that you can deploy repeatedly with automated upkeep.

Read More at Enable Sysadmin

The post Build a golden image for your RHEL homelab with Image Builder appeared first on Linux.com.

02:54

Security updates for Monday LWN.net

Security updates have been issued by Debian (firefox-esr, imagemagick, sox, thunderbird, and xapian-core), Fedora (chromium, containernetworking-plugins, guile-gnutls, mingw-python-OWSLib, pack, pypy3.7, sudo, thunderbird, tigervnc, and vim), Mageia (apache, epiphany, heimdal, jasper, libde265, libtpms, liferea, mysql-connector-c++, perl-HTML-StripScripts, protobuf, ruby-git, sqlite3, woodstox-core, and xfig), Oracle (kernel), Red Hat (firefox, nss, and openssl), SUSE (apache2, docker, drbd, kernel, and oracleasm), and Ubuntu (curl, python2.7, python3.10, python3.5, python3.6, python3.8, and vim).

02:00

How an Electrical Engineer Solved Australias Most Famous Cold Case IEEE Spectrum



Dead, and in a jacket and tie. Thats how he was on 1 December 1948, when two men found him slumped against a retaining wall on the beach at Somerton, a suburb of Adelaide, Australia.

Photo of a person in a shirt and tie. The Somerton Mans body was found on a beach in 1948. Nobody came forward to identify him. JAMES DURHAM

Police distributed a photograph, but no one came forward to claim the body. Eyewitnesses reported having seen the man, whom the newspapers dubbed the Somerton Man and who appeared to be in his early 40s, lying on the beach earlier, perhaps at one point moving his arm, and they had concluded that he was drunk. The place of death led the police to treat the case as a suicide, despite the apparent lack of a suicide note. The presence of blood in the stomach, a common consequence of poisoning, was noted at the autopsy. Several chemical assays failed to identify any poison; granted, the methods of the day were not up to the task.

Photo of a building from the outside The place on Somerton Beach where the man was found dead is marked with an X. NEWS CORP./ALAMY

...

01:52

Threat actors abuse Adobe Acrobat Sign to distribute RedLine info-stealer Security Affairs

Threat actors are abusing the legitimate Adobe Acrobat Sign service to distribute the RedLine information stealer.

Avast researchers reported that threat actors are abusing the legitimate Adobe Acrobat Sign service to distribute the RedLine information stealer.

Adobe Acrobat Sign allows registered users to sign documents online and send a document signature request to anyone. This latter process consists of generating an email that is sent to the intended recipients. The message includes a link to the document that that will be hosted on Adobe itself. 

The experts pointed out that the users can also add a text to the email, this option can be abused by the attackers.

Le e-mail generate dai servizi hanno come indirizzo del mittente adobesign@adobesign.com, che ovviamente un indirizzo e-mail legittimo considerato affidabile da qualsiasi soluzione di difesa.

When the victim clicks on the Review and sign button, it takes them to a page hosted in eu1.documents.adobe.com/public/, which is another legitimate source that belongs to Adobe. As I mentioned earlier, people using this service can upload a broad variety of file types to Adobe Acrobat Sign, which will be displayed in the email with the option to sign them. 

Avast researchers observed crooks including text with a link in a document that attempts to trick the victim into thinking that theyll be through the content before signing it. Once clicked on the link, the victim is redirected to another site where theyre asked to enter a CAPTCHA that is hardcoded.

Upon providing the CAPTCHA, the victim will be asked to download a ZIP archive containing the...

01:47

Why You Should Opt Out of Sharing Data With Your Mobile Provider Krebs on Security

A new breach involving data from nine million AT&T customers is a fresh reminder that your mobile provider likely collects and shares a great deal of information about where you go and what you do with your mobile device unless and until you affirmatively opt out of this data collection. Heres a primer on why you might want to do that, and how.

Image: Shutterstock

Telecommunications giant AT&T disclosed this month that a breach at a marketing vendor exposed certain account information for nine million customers. AT&T said the data exposed did not include sensitive information, such as credit card or Social Security numbers, or account passwords, but was limited to Customer Proprietary Network Information (CPNI), such as the number of lines on an account.

Certain questions may be coming to mind right now, like What the heck is CPNI? And, If its so customer proprietary, why is AT&T sharing it with marketers? Also maybe, What can I do about it? Read on for answers to all three questions.

AT&Ts disclosure said the information exposed included customer first name, wireless account number, wireless phone number and email address. In addition, a small percentage of customer records also exposed the rate plan name, past due amounts, monthly payment amounts and minutes used.

CPNI refers to customer-specific metadata about the account and account usage, and may include:

-Called phone numbers
-Time of calls
-Length of calls
-Cost and billing of calls
-Service features
-Premium services, such as directory call assistance

According to a succinct CPNI explainer at TechTarget, CPNI is private and protected information that cannot be used for advertising or marketing directly.

An individuals CPNI can be shared with other telecommunications providers for network operating reasons, wrote TechTargets Gavin Wright. So, when the individual first signs up for phone service, this information is automatically shared by the phone provider to partner companies.

Is your mobile Internet usage covered by CPNI laws? Thats less clear, as the CPNI rules were established before mobile phones and wireless Internet access were common. TechTargets CPNI primer explains:

Under current U.S. law, cellphone use is only protected...

01:19

Distribution Release: Tails 5.11 DistroWatch.com: News

The Amnesic Incognito Live System (Tails) is a Debian-based live DVD/USB with the goal of providing Internet anonymity for the user. The project's latest release, Tails 5.11, introduces zRAM for increasing memory capacity which should allow for longer sessions. "Tails 5.11 is out. New features: Tails now uses....

01:09

Bet 365 Sports Betting h+ Media

Bet 365 Sports Betting

It is considered one of the reasons Bet365 is gaining rapid recognition, as plenty of punters are getting pulled in the course of the vast live betting choices. In reside betting, you possibly can place bets as soon as the match has begun, enhancing the joy of betting. Bet365 only provides around 30 various sorts of games, which include all major sports such as American football , soccer , cricket , basketball , hockey , and more! There are also some less popular sports, similar to Australian Rules Football and handball (Handball-Bundesliga).

Under gadget administration, click on the part highlighted as an enterprise application and then click on KONTRAST, 000. First, you have to open the Melbet site in your cellphone. At the bottom of the home page, click the Mobile Version hyperlink. After that, click on on the Melbet apk obtain button with the Android logo. The Melbet apk download file may also be mechanically downloaded to your system.

The act of gambling on this method is prohibited by regulation. According to the legislation, occurrences whose outcome could be obtained via the applying of talent by the parties concerned as stakeholders arent thought to be a big gamble. Surprisingly, Indian regulation divides games into two types, i.e. Games of skill and video games of luck or chance are two forms of video games. The states have the best to create and management their very own web betting rules. Only two Indian states have handed laws on the subject so far.

This might simply be one of many troublesome spots for any bookmaker to cowl given the sheer volume of tournaments, matches, and bet sorts in query. Yet, I didnt encounter any single situation the place the shape disappointed me with its protection. It is sort of common for any bookmaker to offer more on the top leagues like the English Premier League or Spanish La Liga. Yet, you can use Bet365 and find markets and even obscure leagues taking place in every nook and nook of the world. Even although the amount of markets out there in these obscure leagues may not be large, they are still an enormous benefit in contrast with my expertise with different bookmakers.

In case of a match is finished earlier than sure points/games have been completed, all affected point/game associated markets are thought-about void. In case of default, retirement or walkover of any player, all undecided bets are considered void. No argument or declare in that context would be entertained and the decision made by company administration will stand as last authority. On June 1st, the Minister of Petroleum & Natural Gas, GOI formally launched the scheme direct profit switch for LPG Scheme in 20 high Aadhaar coverage districts.

To do this, you need to send a photograph of some documents to the support service and request a profile confirmation. Documents for verification should affirm your identity and place of residence. A passp...

01:08

25 Years of curl LWN.net

Daniel Stenberg observes the 25th anniversary of the curl project.

We really have no idea exactly how many users or installations of libcurl there are now. It is easy to estimate that it runs in way more than ten billion installations purely based on the fact that there are 7 billion smart phones and 1 billion tablets in the world , and we know that each of them run at least one, but likely many more curl installs.

Curl 8.0.0 has also been released (quickly followed by 8.0.1).

01:06

India Fantasy h+ Media

India Fantasy

If you obtained the software program from one other source, uninstall it and reinstall it based on our instructions on how to obtain the Bet365 app. Check if you have learn and performed all the app Bet365 download steps appropriately. Reinstall the software after deleting the old obtain. Verify that your device meets all the prior minimal necessities and has enough memory house. To download the newest Bet365 software program update for your Android or iOS gadget click on on the Bet365 download hyperlink that we mentioned previously. With this selection, you wont miss the most important events!

Most of you must have heard in regards to the Bet365 betting website. It is considered one of the most recognised and trusted websites in sports activities betting. The site supplies a sportsbook not solely in India but on the earth. The games include football, cricket, horse racing, etc. The web site is the first to launch varied features which might be thought-about the most effective for betting sites. Bet365 is among the many most famous betting sites in India, where Indian gamers can play completely different kinds of on line casino video games and bet on a range of sports activities events.

As a outcome, the site loads very quickly and is incredibly intuitive and user-friendly. Navigation is greatly facilitated with all sections of the betting websites on the left-hand aspect of the display screen. Bet365 pays nice consideration to buyer satisfaction, as shown by the detailed Help centre and complete guides for betting into the mix. By clicking on the bet365s Soccer tab, you can see more betting choices than you can rely. Neither does the inclusion of other prime European leagues corresponding to Serie A, Bundesliga, Ligue A, and La Liga. Pretty much each upper-echelon event and competition on the earth has its rightful place within the supply.

  • As it fulfils all of the required standards to operate in India hassle-free.
  • Get your self a camera and join a images club, Ultimate Fire Link.
  • The gamers from Australia, on the other hand, are performing excellently on all fields.
  • You can find enhanced odds for cricket and soccer they often relate to the most popular picks too.

You can play day by day fantasy sports video games based mostly on real-world events on each websites. Both websites supply various games, including football, basketball, baseball, hockey, soccer, golf, and more. Sports betting enthusiasts get 15% as much as 4,000 rupees in their account on their first deposit. This is a superb amount to begin betting in the Bet365 app! To win again the bonus, guess at odds of 1.2 or greater. During my time, Ive always used E-Wallets to add and withdraw funds.

On common, Bet365 has over 100 markets per event. Initially, the principle outcomes are added to the lineup. To see the complete listing of betting choices, you have to open a selec...

01:06

How Do I Calculate My Fastened Deposit? h+ Media

How Do I Calculate My Fastened Deposit?

The finest issues in life are free and so is also Bet365 reside streaming. All you want to do to get pleasure from hundreds of sportsevents free of charge is to ensure you have a funded account. Apps can sometimes be annoying as your cell gets crowded with lots of of cell apps that fill your phone display screen. If you like to excellent alternative. If you may be up for extra of those speciality video games, you wont be dissatisfied.Spin-A-Winis a Wheel of Fortune sort of recreation where gamers get to spin the wheel and win nice prizes.

However, whether or not a sport is a sport of skill or a sport of likelihood continues to be controversial, as a end result of sports activities with comparable features are categorised in a unique way. When it involves state legal guidelines, states like Maharashtra have banned on-line betting beneath the Bombay Wager Act on their own. The statute, then again, makes no point out of the phrases betting or gambling wherever in its text. As a result, internet betting sites similar to Bet365 and Dream11 arent lined by this statute. Although there are no express guidelines governing online betting in India, there are legal guidelines that can be utilized to control this follow. DST Global, D1 Capital are out there in as new investors because the sports tech agency desires to diversify past online fantasy gaming.

This might easily be one of many tough spots for any bookmaker to cowl given the sheer volume of tournaments, matches, and bet types in query. Yet, I did not encounter any single situation the place the shape disappointed me with its protection. It is quite common for any bookmaker to supply more on the top leagues like the English Premier League or Spanish La Liga. Yet, you should use Bet365 and discover markets and even obscure leagues taking place in each nook and nook of the world. Even though the quantity of markets obtainable in these obscure leagues may not be large, theyre still a huge benefit in contrast with my expertise with different bookmakers.

From my experience, its at all times better to undergo the phrases and situations talked about within the promotions part to know how they really work. You need to put bets that are worth 12x your qualifying deposit to get that free guess deposited into your account. When you make a qualifying deposit of $10 or more, you will be eligible to get 15% of that quantity back in guess credit. So, should you make a deposit of $100, you might be eligible to get $15 in bet credit. Again, there is not a processing charge right here except for bank switch, the place youll be charged Rs.600 should you withdraw your funds greater than as soon as in a 28 day interval. Withdrawals work pretty much in the identical means as deposits.

This is the biggest seal of approval for any world betting web sit...

01:04

Bet365 Play United Kingdom Roulette Online h+ Media

Bet365 Play United Kingdom Roulette Online

Although Bet365 has added on-line on line casino games to its choices, the main focus of Bet365 remains sports activities betting and it has made a name for itself as one of many Best Bookmakers in India. Our Bet365 evaluations are authentic and complete, and Bet365 ratings are unbiased. Despite the give consideration to sports betting, our Bet365 on line casino reviews have found that theres an adequate variety of casino video games available, with many live on line casino options. Keep studying to see why this can be a great betting site.

Live betting involves wagering cash on sporting occasions that are currently in play. There are several markets out there for reside betting at Bet365. The supply comes with a wagering requirement of 30x, and it may be used on most of the video games featured by the betting website. Youll want to use the bonus codeBONUS100when making your first deposit before you probably can declare the provide. In this photograph illustration, the Bet365 British online gambling and casino games company web site is displayed on a smartphone. This increase has prompted Indias richest man, Mukesh Ambani, to say the business eventually will surpass that of music, motion pictures and TV shows combined.

I went via a challenging time in my private life a few years ago. I assumed whatever I was feeling was pure grief submit a painful divorce. When the emotional roller-coaster dragged ove Depression helped me turn into a better model of myself. This expertise has helped me to turn out to be more understanding, empathetic, and fewer judgemental.

  • Live Dealer Weekly Rebate Bet365 on line casino grants a weekly rebate of as a lot as 0.8% based on the players whole stake on stay on line casino titles during the promo period.
  • One of the the reason why I prefer Bet365 to most of the different bookmakers out there may be owing to their buyer assist.
  • You need to show a stable availability of funds to be part of the platform.
  • The Bet365 sports activities bonus is amongst the most generous welcome bonuses you may get in India.

First, create a Bet365 account and deposit funds into your betting account. DraftKings is amongst the finest sportsbooks providing free-to-play contests. A bookmaker may be ideal, relying on your needs. Check out this comparability to decide if DraftKings is the most effective sportsbook. When you enroll on Bet365, you should reap the benefits of the generous welcome offer using a selected promo code. Apply the promo code via the sportsbooks promotion page.

Bet365 is one of the online betting trade giants within the European Union https://casinocanavari.icu/gold-beaver-slot/. Bet365 is an authorized on-line betting platform, which acts as a contributing issue for justifying its recognition in the E...

00:54

CVE-2023-26513: Apache Sling Resource Merger: Requests to certain paths managed by the Apache Sling Resource Merger can lead to DoS Open Source Security

Posted by Radu Cotescu on Mar 20

Description:

Excessive Iteration vulnerability in Apache Software Foundation Apache Sling Resource Merger.This issue affects Apache
Sling Resource Merger: from 1.2.0 before 1.4.2.

This issue is being tracked as SLING-11776

Credit:

Alex Collignon (reporter)

References:

https://sling.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-26513
https://issues.apache.org/jira/browse/SLING-11776

00:54

The Universal Sound of Swearing Across Languages SoylentNews

Swear words across different languages may tend to lack certain sounds such as l, r, and w:

Swear words across different languages may tend to lack certain sounds such as l, r, and w, suggests research published in Psychonomic Bulletin & Review. This common pattern in profanity indicates that these sounds, called approximants, may appear less offensive to listeners.

Swear words are thought to have sounds that help facilitate the expression of emotion and attitude, but no study to date has investigated if there is a universal pattern in the sound of swearing across different languages.

[...] The authors asked 215 participants (from across six different languages) to rate pairs of pseudo-words (imaginary words created by the authors), one of which included an approximant. For example, in Albanian, the authors took the word "zog", meaning "bird", and changed this to "yog" to include an approximant and "tsog" without an approximant. The authors found that participants were significantly less likely to judge that words with approximants were swear words and selected words without approximants as swear words 63% of the time.

In a following study, the authors also looked at minced oaths which are variations of swear words deemed less offensive, for example "darn" instead of "damn". The authors found that approximants were significantly more frequent in minced oaths than swear words. The authors propose that this introduction of approximants is part of what makes minced oaths less offensive than swear words.

The authors conclude that their work suggests a potential universal pattern to swear words across different languages, with the lack of approximants a common feature when perceiving swear words.

Journal Reference:
Lev-Ari, S., McKay, R. The sound of swearing: Are there universal patterns in profanity? Psychon Bull Rev (2022). https://doi.org/10.3758/s13423-022-02202-0


Original Submission

Read more of this story at SoylentNews.

00:47

Agilitys Latest Digit Robot Prepares for Its First Job IEEE Spectrum



This morning at the ProMat conference in Chicago, Agility Robotics is introducing the latest iteration of Digit, its bipedal multipurpose robot designed for near-term commercial success in warehouse and logistics operations. This with manipulators intended for the very first task that Digit will be performing, one that Agility hopes will be its entry point to a sustainable and profitable business bringing bipedal robots into the workplace.

So thats a bit of background, and if you want more, you should absolutely read the article that Agility CTO and cofounder Jonathan Hurst wrote for us in 2019 talking about the origins of this bipedal (not humanoid, mind you) robot. And now that youve finished reading that, heres a better look at the newest, fanciest

The most visually apparent change here is of course Digits head, which either makes the robot look much more normal or a little strange depending on how much success youve had imagining the neck-mounted lidar on the previous doneDigit is (again) a biped rather than a humanoid, in the sense that the head is not really intended to evoke a humanlike head, which is why its decidedly sideways in a way that human heads generally arent. But at the same time, the purpose of the head is to provide a human-robot interaction (HRI) focal point so that humans can naturally understand what Digit is doing. Theres still work to be done here; were told that this isnt the final version, but its at the point where Agility can start working with customers to figure out...

00:39

New DotRunpeX Malware Delivers Multiple Malware Families via Malicious Ads The Hacker News

A new piece of malware dubbed dotRunpeX is being used to distribute numerous known malware families such as Agent Tesla, Ave Maria, BitRAT, FormBook, LokiBot, NetWire, Raccoon Stealer, RedLine Stealer, Remcos, Rhadamanthys, and Vidar. "DotRunpeX is a new injector written in .NET using the Process Hollowing technique and used to infect systems with a variety of known malware families," Check

00:21

Interstellar Research Group: 8th Interstellar Symposium Second Call for Papers Centauri Dreams Imagining and Planning Interstellar Exploration

Interstellar Research Group: 8th Interstellar Symposium Second Call for Papers

Abstract Submission Final Deadline: April 21, 2023

The Interstellar Research Group (IRG) in partnership with the International Academy of Astronautics (IAA) hereby invites participation in its 8th Interstellar Symposium, hosted by McGill University, to be held from Monday, July 10 through Thursday, July 13, 2023, in Montreal, Quebec, Canada. This is the first IRG meeting outside of the United States, and we are excited to partner with such a distinguished institution!

Topics of Interest

Physics and Engineering

Propulsion, power, communications, navigation, materials, systems design, extraterrestrial resource utilization, breakthrough physics

Astronomy

Exoplanet discovery and characterization, habitability, solar gravitational focus as a means to image exoplanets

Human Factors

Life support, habitat architecture, worldships, population genetics, psychology, hibernation, finance

Ethics

Sociology, law, governance, astroarchaeology, trade, cultural evolution

Astrobiology

Technosignature and biosignature identification, SETI, the Fermi paradox, von Neumann probes, exoplanet terraformation

Submissions on other topics of direct relevance to interstellar travel are also welcome. Examples of presentations at past symposia can be found here:
https://www.youtube.com/c/InterstellarResearchGroup/videos

Confirmed Speakers

Dr. Stephen Webb (University of Portsmouth)
Silence is Golden: SETI and the Fermi Paradox

Dr. Kathryn Denning (York University)
Anthropological Observations for Intestellar Aspirants

Dr. Rebecca M. Rench (Planetary Science Division, NASA Headquarters)
The Search for Life and Habitable Worlds at NASA: Past, Present and Future

Dr. Frank Tipler (Tulane University)
The Ultimate Rocket and the Ultimate Energy Source and their Use in the Ultimate Futur...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Monday, 20 March

23:57

Analysis of the recent volatility in the cryptocurrency market HackRead | Latest Cybersecurity and Hacking News Site

By Owais Sultan

The cryptocurrency market is extremely volatile. The unpredictable nature is both good and bad for traders and investors.

This is a post from HackRead.com Read the original post: Analysis of the recent volatility in the cryptocurrency market

23:41

Hackers can hijack Samsung and Pixel phones by knowing phone number HackRead | Latest Cybersecurity and Hacking News Site

By Deeba Ahmed

In addition to Google Pixel and Samsung devices, Vivo devices were also vulnerable to this attack.

This is a post from HackRead.com Read the original post: Hackers can hijack Samsung and Pixel phones by knowing phone number

23:38

Agility Robotics: Digit cryptogon.com

So, youre living in a van down by the river, hoping to pick up some short term work at a fulfillment center during Christmas. And then Via: Agility Robotics:

23:26

Mispadu Banking Trojan Targets Latin America: 90,000+ Credentials Stolen The Hacker News

A banking trojan dubbed Mispadu has been linked to multiple spam campaigns targeting countries like Bolivia, Chile, Mexico, Peru, and Portugal with the goal of stealing credentials and delivering other payloads. The activity, which commenced in August 2022, is currently ongoing, Ocelot Team from Latin American cybersecurity firm Metabase Q said in a report shared with The Hacker News. Mispadu (

23:14

Ubuntu's Mir 2.13 Released With Wayland Updates, Other Enhancements Phoronix

Ahead of next month's Ubuntu 23.04 release, Canonical has that in its current incarnation is focused on serving as a Wayland compositor and abstraction layer...

22:34

Zippyshare Quits After 17 Years, 45m Visits Per Month Makes No Money TorrentFreak

zippylogoWhen file-hosting service Zippyshare showed its first signs of life in September 2006, accessing the site using an iPhone was impossible; the smart phones existence wouldnt be announced for another four months.

Zippyshares success was built on solid yet basic foundations; straightforward free hosting of files, via a clean interface, at zero cost to the user. With relatively few options available elsewhere, Zippyshare was a huge success and to celebrate its first birthday, Zippyshare went BIG.

A few days ago Zippyshare.com turned one year old, its operators wrote in 2007. For Zippyshares first birthday we are raising the filesize limit to 100mb.

Upgrade After Upgrade

After repeatedly upgrading to meet rising demand, Zippyshare launched Zippyshare Uploader, a software application that allowed users to upload files without using a web browser.

zippy1

Almost three years after the surprise 100mb limit was introduced, Zippyshare doubled its filesize limit to 200mb. A little later, when the internet was consumed with Megaupload being taken down, Zippyshare carried on as if nothing had happened, or it did once its email servers had been fixed.

Zippyshare Breaks Five-Year Silence With Bad News

When Zippyshares operators announced the shutdown of the site yesterday, that was the first update posted to the site for almost five years.

Weve decided that were shutting down the project at the end of the month. Please make backups of your important files, you have about two weeks to do so. Until then, the site will run without any changes, the announcement reads.

zippyshare shuts down

In ad...

22:22

How AI could upend the world even more than electricity or the internet Lifeboat News: The Blog

The rise of artificial general intelligence now seen as inevitable in Silicon Valley will bring change that is orders of magnitude greater than anything the world has yet seen, observers say. But are we ready?

AGI defined as artificial intelligence with human cognitive abilities, as opposed to more narrow artificial intelligence, such as the headline-grabbing ChatGPT could free people from menial tasks and usher in a new era of creativity.

But such a historic paradigm shift could also threaten jobs and raise insurmountable social issues, experts warn.

22:13

PCIe for Hackers: The Diffpair Prelude SoylentNews

https://hackaday.com/2023/03/14/pcie-for-hackers-the-diffpair-prelude/

PCIe, also known as PCI-Express, is a highly powerful interface. So let's see what it takes to hack on something that powerful. PCIe is be a bit intimidating at first, however it is reasonably simple to start building PCIe stuff, and the interface is quite resilient for hobbyist-level technology. There will come a time when we want to use a PCIe chip in our designs, or perhaps, make use of the PCIe connection available on a certain Compute Module, and it's good to make sure that we're ready for that.

PCIe is everywhere now. Every modern computer has a bunch of PCIe devices performing crucial functions, and even iPhones use PCIe internally to connect the CPU with the flash and WiFi chips. You can get all kinds of PCIe devices: Ethernet controllers, high-throughput WiFi cards, graphics, and all the cheap NVMe drives that gladly provide you with heaps of storage when connected over PCIe. If you're hacking on a laptop or a single-board computer and you'd like to add a PCIe device, you can get some PCIe from one of the PCIe-carrying sockets, or just tap into an existing PCIe link if there's no socket to connect to. It's been two decades since we've started getting PCIe devices now, PCIe is on its 5.0 revision, and it's clear that it's here to stay.

PCIe is a point-to-point bus that connect two devices together as opposed to PCI, an older bus, that could connect a chain of devices on your mainboard. One side of a PCIe link is a device, and another is a host. For instance, in a laptop, your CPU will have multiple PCIe ports some used to connect the GPU, some used to connect a WiFi card, some used for Ethernet, and some used for a NVMe drive.

Each PCIe link consists of at least three differential pairs one is a 100 MHz clock, REFCLK, that is (almost) always required for a link, and two pairs that form a PCIe lane one for transmit and another for receive. This is an x link you can also have 2x, 4x, 8x and 16x links, with four, eight sixteen and thirty-two differential pairs respectively, plus, again, REFCLK. The wider the link, the higher its throughput!


Original Submission

Read more of this story at SoylentNews.

22:00

Remote Water Quality Monitoring Hackaday

While it can be straightforward to distill water to high purity, this is rarely the best method for producing water for useful purposes. Even drinking water typically needs certain minerals in it, plants may need a certain pH, and wastewater systems have a whole host of other qualities that need to be measured. Measuring water quality is a surprisingly complex endeavor as a result and often involves a wide array of sensors, much like this water quality meter from [RowlesGroupResearch].

The water quality meters that they are putting to use are typically set up in remote locations, without power, and are targeting natural bodies of water and also wastewater treatment plants. Temperature and pH are simple enough to measure and grasp, but this device also includes sensors for total dissolved solids (TDS) and turbidity which are both methods for measuring various amounts and types of particles suspended in the water. The build is based around an Arduino so that it is easy for others to replicate, and is housed in a waterproof box with a large battery, and includes data logging to an SD card in order to make it easy to deploy in remote, outdoor settings and to gather the data at a later time.

The build log for this device also goes into detail about al...

22:00

Intel Xeon Sapphire Rapids Code Continues Landing For Coreboot Phoronix

More Intel 4th Gen Xeon Scalable "Sapphire Rapids" code was merged this weekend into Coreboot as part of enabling this latest generation Intel server platform to enjoy this open-source system firmware solution when paired with the necessary Intel FSP binaries...

21:55

Emotet is back after a three-month hiatus Security Affairs

The infamous Emotet malware is back after a short hiatus, threat actors are spreading it via Microsoft OneNote email attachments.

The Emotet malware returns after a three-month hiatus and threat actors are distributing it via Microsoft OneNote email attachments to avoid detection.

The Emotet banking trojan has been active at least since 2014, the botnet is operated by a threat actor tracked as TA542.

The infamous banking trojan was also used to deliver other malicious code, such as Trickbot and QBot trojans, or ransomware such as ContiProLockRyuk, and Egregor.

In April, the operators of the infamous Emotet botnet started testing new attack techniques in response to Microsofts move to disable Visual Basic for Applications (VBA) macros by default.

In June, Proofpoint experts spotted a new variant of the Emotet bot that uses a new module to steal credit card information stored in the Chrome web browser.

Over time, Emotet operators have enhanced their attack chain by employing multiple attack vectors to remain under the radar.

The operators remained inactive between July and November 2022. In November, Proofpoint researchers warned of the return of the Emotet malware after having observed a high-volume malspam campaign delivering payloads like...

21:44

New Cyber Platform Lab 1 Decodes Dark Web Data to Uncover Hidden Supply Chain Breaches The Hacker News

2022 was the year when inflation hit world economies, except in one corner of the global marketplace stolen data. Ransomware payments fell by over 40% in 2022 compared to 2021. More organisations chose not to pay ransom demands, according to findings by blockchain firm Chainalysis. Nonetheless, stolen data has value beyond a price tag, and in risky ways you may not expect. Evaluating stolen

21:33

Apache CloudStack 4.18 LTS Released For Launching Your Own Open-Source Cloud Phoronix

Apache CloudStack 4.18 LTS has been released as the newest building out your own cloud atop various hypervisors and allows easy management for large networks of VMs...

21:26

Researchers Shed Light on CatB Ransomware's Evasion Techniques The Hacker News

The threat actors behind the CatB ransomware operation have been observed using a technique called DLL search order hijacking to evade detection and launch the payload. CatB, also referred to as CatB99 and Baxtoy, emerged late last year and is said to be an "evolution or direct rebrand" of another ransomware strain known as Pandora based on code-level similarities. It's worth noting that the use

21:16

Intel Compute Runtime Updated With Initial Xe Kernel Driver Support Phoronix

Getting back on track for its new release rhythm, Intel today Intel Graphics Compiler 1.0.13230.7...

21:06

curl 8.0 Released To Celebrate Project's 25th Birthday Phoronix

The open-source cURL project providing the widely-used curl CLI program for downloading of data across numerous network protoocols along with its associated library is celebrating 25 years of the project. As part of the celebrations, curl 8.0 was released today...

20:49

Waterfall Security Solutions launches WF-600 Unidirectional Security Gateway Help Net Security

Waterfall Security Solutions launched the WF-600 Unidirectional Security Gateway, an OT security protection against remote cyber attacks. The WF-600 product line is a blend of hardware and software, enabling unbreachable protection at IT/OT interfaces with unlimited visibility into OT networks, systems and data. The new WF-600 series of products represent decades of experience, investment and innovation, incorporating feedback received from thousands of critical infrastructure and manufacturing sites. Whats new in the 600 series includes: Integrated More

The post Waterfall Security Solutions launches WF-600 Unidirectional Security Gateway appeared first on Help Net Security.

20:46

Dragonfly 1.0 Released For What Claims To Be The World's Fastest In-Memory Data Store Phoronix

Dragonfly as what's a high performnace in-memory database compatible with the Memcached and Redis APIs has reached version 1.0...

20:10

How to protect online privacy in the age of pixel trackers Help Net Security

Tracking pixels like the Meta and TikTok pixels are popular tools for online businesses to monitor their website visitors behaviors and preferences, but they do come with risks. While pixel technology has been around for years, privacy regulations such as CCPA and GDPR have created new, much stricter rules, making the practice of data harvesting through a tracking pixel highly controversial. Tracking pixels on your website means that website owners are considered data controllers and More

The post How to protect online privacy in the age of pixel trackers appeared first on Help Net Security.

19:26

Deepfakes, Synthetic Media: How Digital Propaganda Undermines Trust SoylentNews

Organizations must educate themselves and their users on how to detect, disrupt, and defend against the increasing volume of online disinformation:

More and more, nation-states are leveraging sophisticated cyber influence campaigns and digital propaganda to sway public opinion. Their goal? To decrease trust, increase polarization, and undermine democracies around the world.

In particular, synthetic media is becoming more commonplace thanks to an increase in tools that easily create and disseminate realistic artificial images, videos, and audio. This technology is advancing so quickly that soon anyone will be able to create a synthetic video of anyone saying or doing anything the creator wants. According to Sentinel, there was a 900% year-over-year increase in the proliferation of deepfakes in 2020.

It's up to organizations to protect against these cyber influence operations. But strategies are available for organizations to detect, disrupt, deter, and defend against online propaganda. Read on to learn more.

[...] As technology advances, tools that have traditionally been used in cyberattacks are now being applied to cyber influence operations. Nation-states have also begun collaborating to amplify each other's fake content.

These trends point to a need for greater consumer education on how to accurately identify foreign influence operations and avoid engaging with them. We believe the best way to promote this education is to increase collaboration between the federal government, the private sector, and end users in business and personal contexts.

Read more of this story at SoylentNews.

19:00

A Feature-Rich Amplifier Module For 3-Way Speaker Builds Hackaday

Theres something rewarding about building your own DIY audio hardware. Knowing you put it together yourself gives you faith in the construction, and psychosomatically makes the music sound all that much sweeter. If youre into that kind of thing, you might like to give [Eric Sorensens] Denmark amplifier module a look.

The amplifier is intended to be used in a 3-way system, running a subwoofer, woofer, and tweeter. It uses a 1000 W ICEpower module to run the subwoofer, with a pair of 500W ICEpower modules to run the woofer and tweeter respectively. Meanwhile, a MiniDSP 2x4HD is used to accept optical audio input. It also offers digital signal processing and serves as a crossover to split the signal across the three speakers. An STM32F401 is used to run the show, controlling all the various modules and the necessary status LEDs. Its a feature-rich build, too, with overtemperature monitoring, fan control, and clipping warnings built in.

The whole setup is built on to a sturdy aluminium backplate. The CNC-machined panel has simple tactile buttons for control. There&#...

18:39

[SECURITY ADVISORY] curl: CVE-2023-27538: SSH connection too eager reuse still Open Source Security

Posted by Daniel Stenberg on Mar 20

CVE-2023-27538: SSH connection too eager reuse still
====================================================

Project curl Security Advisory, March 20th 2023 -
[Permalink](https://curl.se/docs/CVE-2023-27538.html)

VULNERABILITY
-------------

libcurl would reuse a previously created connection even when an SSH related
option had been changed that should have prohibited reuse.

libcurl keeps previously used connections in a connection pool for...

18:36

[SECURITY ADVISORY] curl: CVE-2023-27537: HSTS double-free Open Source Security

Posted by Daniel Stenberg on Mar 20

CVE-2023-27537: HSTS double-free
================================

Project curl Security Advisory, March 20th 2023 -
[Permalink](https://curl.se/docs/CVE-2023-27537.html)

VULNERABILITY
-------------

libcurl supports sharing HSTS data between separate "handles". This sharing was
introduced without considerations for do this sharing across separate threads
but there was no indication of this fact in the documentation.

Due to missing...

18:34

[SECURITY ADVISORY] curl: CVE-2023-27536: GSS delegation too eager connection re-use Open Source Security

Posted by Daniel Stenberg on Mar 20

CVE-2023-27536: GSS delegation too eager connection re-use
==========================================================

Project curl Security Advisory, March 20th 2023 -
[Permalink](https://curl.se/docs/CVE-2023-27536.html)

VULNERABILITY
-------------

libcurl would reuse a previously created connection even when the GSS
delegation (`CURLOPT_GSSAPI_DELEGATION`) option had been changed that could
have changed the user's permissions in a...

18:32

[SECURITY ADVISORY] curl: CVE-2023-27535: FTP too eager connection reuse Open Source Security

Posted by Daniel Stenberg on Mar 20

CVE-2023-27535: FTP too eager connection reuse
==============================================

Project curl Security Advisory, March 20th 2023 -
[Permalink](https://curl.se/docs/CVE-2023-27535.html)

VULNERABILITY
-------------

libcurl would reuse a previously created FTP connection even when one or more
options had been changed that could have made the effective user a very
different one, thus leading to the doing the second transfer with wrong...

18:30

[SECURITY ADVISORY] curl: CVE-2023-27534: SFTP path ~ resolving discrepancy Open Source Security

Posted by Daniel Stenberg on Mar 20

CVE-2023-27534: SFTP path ~ resolving discrepancy
=================================================

Project curl Security Advisory, March 20th 2023 -
[Permalink](https://curl.se/docs/CVE-2023-27534.html)

VULNERABILITY
-------------

curl supports SFTP transfers. curl's SFTP implementation offers a special
feature in the path component of URLs: a tilde (`~`) character as the first
path element in the path to denotes a path relative to the...

18:27

[SECURITY ADVISORY] curl: CVE-2023-27533: TELNET option IAC injection Open Source Security

Posted by Daniel Stenberg on Mar 20

CVE-2023-27533: TELNET option IAC injection
============================================

Project curl Security Advisory, March 20th 2023 -
[Permalink](https://curl.se/docs/CVE-2023-27533.html)

VULNERABILITY
-------------

curl supports communicating using the TELNET protocol and as a part of this it
offers users to pass on user name and "telnet options" for the server
negotiation.

Due to lack of proper input scrubbing and without it...

18:24

A Cognitive Revolution in Animal Research Lifeboat News: The Blog

Animal personalities are forcing scientists to rethink basic research.

18:00

How the ancient philosophers imagined the end of the world Terra Forming Terra




Well, they diid and actually left no stone unturned.  It is only the way more recent idea of human progress that we overcome past concepts of worlds ending.  Yet our own history is about knocking down one organized society after another in order to emplace our own form of order.

Today we have created a global civiliuzation which is still a motley mosaic of mostly cultures all now accepting what is economically best described as modernity.

We all also understand that it is unfinished and also its ultimate expression remains unclear.  I speak to the rule of twelve which is still opaque.  Yet that can stand for millions of years and really throughout space and time as accepted truth..

How the ancient philosophers imagined the end of the world

Destruction (1836, detail) from Thomas Coles series The Course of Empire. Courtesy Wikipedia

https://psyche.co/ideas/what-good-was-the-apocalypse-for-the-greeks-and-romans


Christopher Staris professor of Classics at Middlebury College, Vermont. His most recent book is Apocalypse and Golden Age: The End of the World in Greek and Roman Thought (2021).
...

How to make friends as an adult Terra Forming Terra





This is a wonderful article to print up and to distribute at your local coffee shop along with a name tag then kept on a roster board to be put on and taken off when one is in attendence.  It can be called the local coffee shop freindship club and it can be used to support a club email group or even a facebook page as well.

This club can certainly pay attention to folks who are ailing.  That alone can drive it.

It is also the right environment as well.


How to make friends as an adult

Friendships give us so much. Be bold, take the initiative, and youll be surprised how many people are pleased to connect

by Marisa G Franco

Charlton Lido, London. Photo by Kirsty OConnor/Getty

https://psyche.co/guides/how-to-make-new-friends-when-youre-busy-with-adulthood?k

Marisa G Francois a psychologist and author. She writes regularly about connection for Psychology Today and has been a featured connection expert in publications including The New York Times, The Telegraph and Vice. She is currently writing a book, Platonic, on how to make friends as an adult. She lives in Washington, DC.

Edited by...

Pakistan faces terrorism surge post-Afghan war Terra Forming Terra





Of course we have blowback which has been the the history of every other insurgency sponsored by a neighboring power.  At least Stalin knew to round them all up and then shoot them.  After all disloyalty is terribly infectious.

Truth is, the pakistani military is so diserving.  The good news is that it should slowly age out so long as they simply accept the damage.

Even the old NAZIS soon gave it up for a return to civilian life.  Lies eventually lose their edge.



A suicide blast killed 101 in a mosque in Peshawar, Pakistan in January. Terror attacks in the country have increased since the Taliban took power in neighboring Afghanistan in August 2021. Reuters

Pakistan faces terrorism surge post-Afghan war

Islamabad helped bring the Taliban to power, now it faces the consequences

ADNAN AAMIR,
MARCH 15, 2023 06:00 JST

...

A New Science of Heaven with Robert Temple Terra Forming Terra

 


I have been asked to review a new book written by Robert Temple titled A New Science of Heaven.  I am delighted to do so.

it is also a great wake up call for my work on Cloud Cosmology.  Understanding plasma is extremely important.

Understand that any and all clouds of free electrons will naturally be divergent and obviously blow apart.  Bit of a problem if you narrow your vision just to what we can see or detect.  This is of course my beef with all of our physics as I can readily imagine a neutron pair decaying into a free hygrogen ion and an electron.  I can also imagine an electron positron pairing that is also neutral and even an neutrino pair as well.  My Cloud Cosmology also informs how to go about making them as well.

What is important is that we have detected two plasma clouds within the two Lagrange points using optical telescopes.  They are several times larger than our own planet.  This happens to be an excellent location also for a large mass of neutral items just like neutron neutron pairs and all that.  Free electrons will be shielded by these objects and even be nicely aligned with them as well.

All this screams that such neutron pairs form the outer shell of the sun and that such pairs are actively decaying there along with everything else we see.  We are assuming the process is sped up there as well.  Again we are describing obvious forms of so called DARK MATTER that simply cannot be detected by the tools at hand.  And yes, DARK MATTER makes up around 98% of the matter in our galaxy.  It might be important.

The fact is that we are blind to such matter.  Yet it rather nicely accomadates plasma in particular and what has been asigned to Fusion Energy.

I now wonder just what lightening actually is.  Free electrons obviously blow open a physical channel and something then passes through to the Earh's surface.  Ball lightening is an obvious surface of free electrons containing what?  How about neutron pairs we cannot detect?


Understand again, that we...

17:19

Play ransomware gang hit Dutch shipping firm Royal Dirkzwager Security Affairs

Dutch maritime logistics company Royal Dirkzwager suffered a ransomware attack, the company was hit by the Play ransomware gang.

The Play ransomware group hit the Dutch maritime logistics company Royal Dirkzwager.

Royal Dirkzwager is specialized in optimizing shipping processes and managing maritime and logistic information flows.

The ransomware group added the company to its Tor data leak site and announced the theft of stolen private and personal confidential data, employee IDs, passports, contracts and etc.

The gang initially leaked a 5 GB archive as proof of the hack and threatens to release the full dump if the company will not pay the ransom.

Royal Dirkzwager Play ransomware

Company CEO Joan Blaas said that the ransomware attack did not impact the operations of the company. He confirmed that threat actors have stolen sensitive data from its infrastructure.

It has had a huge impact on our employees. Over the last year, because of the companys bankruptcy, we had to let go of people and not everyone could stay. We had to move offices and now this. Its been a very difficult time, Company CEO Joan Blaas told The Record.

The company notified the Dutch Data Protection Authority and confirmed it is in negotiations with the ransomware group.

The Play ransomware group has been active since July 2022, the list of victims includes the City of Oakland and the Cloud services provider Rackspace.

The shipping industry is a privileged target of cybercrime organizations. In January, about 1,000 ves...

16:51

Emotet Rises Again: Evades Macro Security via OneNote Attachments The Hacker News

The notorious Emotet malware, in its return after a short hiatus, is now being distributed via Microsoft OneNote email attachments in an attempt to bypass macro-based security restrictions and compromise systems. Emotet, linked to a threat actor tracked as Gold Crestwood, Mummy Spider, or TA542, continues to be a potent and resilient threat despite attempts by law enforcement to take it down. A

16:39

Humanoid Robots are Coming SoylentNews

Human-shaped robots with dexterous hands will be staffing warehouses and retail stores, tending to the elderly and performing household chores within a decade or so, according to a Silicon Valley startup working toward that vision:

Demographic trends such as a persistent labor shortage and the growing elder care crisis make fully-functioning, AI-driven humanoid robots look tantalizingly appealing.

Companies such as Amazon are reportedly worried about running out of warehouse workers, whose jobs are physically and mentally demanding with high attrition.

A heavy-hitting startup called Figure, which just emerged from stealth mode, is building a prototype of a humanoid robot that the company says will eventually be able to walk, climb stairs, open doors, use tools and lift boxes perhaps even make dinner.

[...] It will take decades for humanoid robots to be able to replicate the sophisticated things our bodies can do, but visionaries are hard at work trying to make it happen.

Previously: Elon Musk Reveals Plans to Unleash a Humanoid Tesla Bot


Original Submission

Read more of this story at SoylentNews.

16:30

Detecting face morphing: A simple guide to countering complex identity fraud Help Net Security

Our reliance on face matching for identity verification is being challenged by the emergence of artificial intelligence (AI) and facial morphing technology. This technique involves digitally creating an image which is an average of two peoples faces, and which can deceive not only human examiners, but also facial recognition systems. The misuse of this technology can enable two individuals to use one ID, presenting a significant risk for businesses and governments. In 2018, a group More

The post Detecting face morphing: A simple guide to countering complex identity fraud appeared first on Help Net Security.

16:24

DNA synthesis technologies to close the gene writing gap Reviews Chemistry Lifeboat News: The Blog

There is increasing demand for synthetic DNA. However, our ability to make, or write, DNA lags behind our ability to sequence, or read, it. This Review discusses commercialized DNA synthesis technologies in the pursuit of closing the DNA writing gap.

16:23

Is Polands tap water really protected by clams? Lifeboat News: The Blog

Using living organisms to ensure water safety.


Theres a lot of articles written about how tap water in Warsaw is constantly tested by a small team of clams. It felt like a hoax to me: so I went to find out. Thanks to MPWiK Warsaw: https://www.mpwik.com.pl/

Producer: Marcin Krasnowolski https://polishfixer.com.
Camera: Micha Opala.
Editor: Michelle Martin
https://twitter.com/mrsmmartin.

Im at https://tomscott.com.
on Twitter at
https://twitter.com/tomscott.

on Facebook at https://facebook.com/tomscott.
and on Instagram as tomscottgo.

16:22

Biologists Figured Out How to Generate New Neurons in the Adult Brain, Revolutionizing Neurodegenerative Disease Research Lifeboat News: The Blog

Recently biologists discovered how to generate new neurons in the adult brain. This is an incredible breakthrough that has enormous potential to revolutionize neurodegenerative disease research. By generating genetically-mutated mice with a unique gene that activates dormant neural stem cells, scientists were able to generate new neurons in the brain. For years, scientists have been searching for ways to promote the growth of new neurons in the brain, especially in individuals with neurodegenerative diseases such as Alzheimers and Parkinsons. This new discovery could lead to new treatments and therapies that could help to restore brain function and improve the quality of life for millions of people around the world.

Leslie Samuel, founder of Interactive Biology, gives some context for the importance of genetic trading between organisms for scientific research, and notes how the loss of nerve cells in the brain is one of the hallmarks of neurodegenerative diseases. The ability to generate new neurons in the adult brain could be a game-changer in the field of neurology.

Leslies Thoughts

16:22

LoRA Weights Lifeboat News: The Blog

LoRA: Low-Rank Adaptation of Large Language Model Introducing ChatLLaMA: Your Personal AI Assistant Powered by LoRA! Were excited to announce that you can now create custom personal assistants that run directly on your GPUs! ChatLLaMA utilizes LoRA, trained on Anthropics HH dataset, to model seamless convos between an AI assistant & users. Plus, the "wp-smiley" src= "https://s.w.org/images/core/emoji/14.0.0/72x72/1f525.png" style= "height: 1em;"> Know any high-quality dialogue-style datasets? Share them with us, and well train ChatLLaMA on them! ChatLLaMA is currently available for 30B and 13B class="wp-smiley" src= "https://s.w.org/images/core/emoji/14.0.0/72x72/1f914.png" style= "height: 1em;"> Have questions or need help setting up ChatLLaMA? Join our Discord group & ask! Lets revolutionize AI-assisted conversations together! Disclaimer: trained for research, no foundation model weights, the post was ran through gpt4 to make it more coherent.

16:22

Microsoft Researchers Propose A New AI Method That Uses Both Forward And Backward Language Models To Meet In The Middle And Improve The Training Data Efficiency Lifeboat News: The Blog

Language models (LMs) have been extensively utilized for various aided writing activities, including text summarization, code completion, and paraphrasing. LMs are effective tools for creating both natural and programming languages. Most LMs must be able to develop the next token from the sequence of earlier tokens to be useful in a wide range of applications. Due to the significance of this operation, pretraining has concentrated on improving the models perplexity in predicting the next token given the last tokens. However, they do have extra information that they are not using during pretraining.

For instance, they entirely disregard the following tokens while training the model to predict one token and only condition on the prefix (prior tokens) (suffix). There are alternative approaches to include the suffix in pretraining that have yet to be discussed in the literature, even though it cannot be utilized as an input to the model. They want to increase the pretraining datas usefulness while maintaining the underlying LMs autoregressive properties. Their strategy calls for more modeling, which at first glance could appear useless. After all, an autoregressive left-to-right LM is a primary artifact created during pretraining, and the pretraining aim closely resembles how the LM is used.

Yet, there are two reasons to explore different training objectives. Data efficiency is discussed in the first. The LM is trained using a sparse, inexpensive signal that generates a probability distribution over all potential next-token selections. However, it is only supervised using the actual next token from the training set. What if a more intense kind of supervision was used during training, where the probability distribution for the next tokens was compared to a different probability distribution? The second justification relates to other connected responsibilities. For instance, the user may prefer to fill in or edit an existing sequence of tokens in many real-world settings rather than creating text entirely from scratch.

16:19

Standard Life Has in Effect Legitimised Business Fraud schestowitz.com

Standard Life Logo
Official Standard Life paperwork (issued by Standard Life) was used to legitimise fraud for over half a decade

Summary: Its starting to look more and more like pension providers in the UK, including some very major and large ones, are aiding criminals who steal money from their workers under the guise of pensions

THIS site isnt about my work colleagues at Sirius Open Source. As explained this past month, this supposedly Open Source (not anymore!) company that was one of the FSFs early sponsors stole a lot of money from employees, myself included. This is now a criminal matter. Several managers knew what was happening; they stole money from many of us and we will put them behind bars if possible (one of them has fled to the United States already).

The pension providers are culpable too, as we shall explain in the habitual updates (maybe once or twice per week).

Former colleagues also chase the matter. Any progress on this? I asked this month. Did you file for review or something to that effect?

As it turns out, pension providers are stonewalling. They try hard to not get involved in these crime investigations. As if ignoring the victims is a wise strategy. Its not. It just makes them look complicit in cover-up. The person I blame the most is Leah Brown at Standard Life. For many weeks she kept saying my hands are tied, refusing to tell me what had actually happened. Shes a manager, so one cannot just report her to a manager. Leah Brown has made Standard Life look like part of the crime and there might be a class action lawsuit on the way. We just try to gather a list of people willing to participate in it (sharing the cost of litigation).

Do you have contact details of other past workers? I asked. Im sure quite a few had this pension and havent been keeping up with its status.

Over the past month I spoke to more former workers than I can count. Some arent surprised by this corruption; their view of the company was already mostly negative. Most of them left years ago.

We recently found out that the exisiting CEO of Sirius (last man standing so to speak) now tries to do the job of the engineers and is failing at it as they left. The former CEO left...

16:00

How to best allocate IT and cybersecurity budgets in 2023 Help Net Security

Despite the economic uncertainty, 57% of organizations plan to increase their cybersecurity budgets in 2023, according to a survey from Arctic Wolf. This highlights a powerful trend: critical needs like security must be addressed even with IT budgets tightening. As 48% of organizations rank ransomware and targeted threats as their number one concern for 2023, how can they allocate that increased cybersecurity budget effectively? In this Help Net Security video, Ian McShane, VP of Strategy More

The post How to best allocate IT and cybersecurity budgets in 2023 appeared first on Help Net Security.

16:00

RP2040 Runs Linux Through RISC-V Emulation Hackaday

A Pi Pico soldered onto a custom breakout PCB, with an SD card connected to it using prototyping wires

Were used to running Linux on CPUs where it belongs, and the consensus is that RP2040 just isnt up for the task no memory controller, and nowhere near enough RAM, to boot. At least, thats what you might believe until you see [tvlad1234]s Linux-on-RP2040 project, reminding us theres more than one way to boot Linux on a CPU like this! Just like with the Linux on AVR project in 2012 that emulated an ARM processor, the pico-rv32ima project emulates a RISC-V core keeping up with the times.

Initially, the aforementioned Linux on AVR through ARM project was picked as a base then, a newer development, [cnlohr]s RISC-V emulator, presented itself and was too good to pass up on. Lack of RAM was fully negated by adding an SD card into the equation coupled with a small caching layer, this is a crucial part for the projects...

15:30

IT security spending to reach nearly $300 billion by 2026 Help Net Security

Worldwide spending on security solutions and services is forecast to be $219 billion in 2023, an increase of 12.1% compared to 2022, according to IDC. Investments in hardware, software, and services related to cybersecurity are expected to reach nearly $300 billion in 2026, driven by the ongoing threat of cyberattacks, the demands of providing a secure hybrid work environment, and the need to meet data privacy and governance requirements. Spend on security products and services More

The post IT security spending to reach nearly $300 billion by 2026 appeared first on Help Net Security.

15:13

Services and Users TRApped in Telescreen-Running Apps Techrights

New article by Alexandre Oliva (FSF Board, Linux-libre etc.)

Summary: TRApp, term that lends its name to this article, is short for "Telescreen-Running App". It sounds just like "trap". Any similarity is not purely coincidental.

Ive noticed a worrisome pattern, in Brazil, wherein companies and even governments entice users to install apps on portable telescreening devices, handheld versions of the telescreens in George Orwell's 1984, also known as smart mobile telephones, pocket electronic ankle tag, or Stalin's dream. They advertise benefits to customers over the same services previously delivered preferentially through web sites and browsers, when these alternatives aren't removed entirely.

As Big Bad Wolf disguised as grandma would respond, "my TRApps are so big the better to see you, dear, and the tighter to hold you." That's surveillance capitalism at work. But do they have any teeth?


First, allow me to detail my observations. It's not just multiple utilities, private businesses and governments advertising they now have apps on both major (nonfree) mobile TRApp stores, that offer similar services to those already available on a web site, but now without the alleged hassle of authenticating every time. It's not just that, while you hold on the phone waiting for a human attendant, recorded messages are played insisting for you to try the TRApp.

What catches my attention is when online merchants offer significant discounts, store credit or free shipping, but only if you make the purchase in the TRApp, rather than their web shop. That gas station chains offer discounts when you pay for your fuel using their TRApp rather than even cash or bank transfer. When banks want you to use their TRApps so bad that they won't just stop adding features to the web site, as if it was legacy abandonware, but will discontinue features that used to be available on the web site, for no reason other than to force you into their TRApps.

Various government agencies now issue virtual documents, such as id card, driver's and car license, voter id, proof of military service and of vaccination, proof of purchases, the list goes on and on but though they look essentially the same as their paper equivalents, and several of them contain even QR codes for validation, some of them are only valid when displayed by the official TRApp. Taking and carrying a digital picture of the paper document won't do, even when a paper copy of the document would!

Most busines...

15:00

Most mid-sized businesses lack cybersecurity experts, incident response plans Help Net Security

99% of all businesses across the United States and Canada are mid-sized businesses facing cybersecurity challenges, according to a Huntress report. Aimed to gain insights into organizational structure, resources and cybersecurity strategies, the results contextualize challenges across core functions including gaps in toolkits, planning, staffing, security awareness training and difficulty to secure cybersecurity insurance. Mid-sized businesses cybersecurity challenges 49% of mid-sized businesses plan to budget more for cyber security in 2023 In the last twelve More

The post Most mid-sized businesses lack cybersecurity experts, incident response plans appeared first on Help Net Security.

13:56

Can ChatGPT Write Better SQL Than a Data Analyst? SoylentNews

Extracting information from databases requires skill and knowledge of query languages like SQL (Structured Query Language).
Natural language querying (NLQ) which is also called Text-to-SQL allows formation of information retrieval questions without knowledge of database-specific languages. ChatGPT is the next level in this area.

Data analyst Marie Truong challenged ChatGPT to write better SQL in January. She is comparing valid SQL syntax, query structure, correct results, and runtime. The result? ChatGPT got 50% of it wrong.

One of many new articles about this topic tries to convert database schemas into natural language as part of chatgpt prompts to provide more precise outcomes:

There has been an expectation that ChatGPT could assist in creating database queries, just as it can assist in creating computer programs. However, creating database queries requires an understanding of the database itself, and there is no conventional way to represent database semantics.

We present a solution to this problem by developing a set of syntax that can represent database semantics, such as table structure and relationships, in natural language. This allows for the creation of semantic representations of databases that can be understood by ChatGPT and enable it to perform database management tasks.

Experiment 2:
A SQL query needs to properly join four tables: careplans, providers, patients, and encounters. The encounters table plays a critical role here as it connects the patients table with the careplans table. This information is typically contained in an Entity Relationship schema.

ChatGPT has successfully generated the query that results in a correct view.

There has been a research about generating SQL queries from natural language since 2016.


Original Submission

Read more of this story at SoylentNews.

13:19

Great Things Brewing Techrights

Summary: Weve been very busy behind the scenes this past week; we expect some good publications ahead

OVER the past few days weve barely published anything because we did lots of work related to tooling and workflow instead. Files were added to Git last night and weve just caught up with a lot of links. Daily Links are very important, orginal articles ideally contain exclusive (original) material. Trying to hold my former employer accountable for actual crimes takes a lot of time and in addition to this weve been investing in the sites future by writing a bunch of supportive programs. Python, Perl, Bash

Over the past few days we stumbled upon some truly encouraging news too.This coming week or fortnight we expect to have some exclusive EPO material. It might even be historic. We want to hold Antnio Campinos accountable; his appointer, Benot Battistelli, was never held accountable for some very serious crimes, which should really embarrass Europe.

Over the past few days we stumbled upon some truly encouraging news too. We intend to write about some of them, seeing that the media and social control media arent willing to.

Windows share: Buried. Can't say that, can we?

Techrights is serving a likely unprecedented 7-8MB/second this weekend. Its mostly because of the RMS talk and partly because of Ken Thompson.

13:00

A Look at Zweikanalton Stereo Audio and Comparison With NICAM Hackaday

With how we take stereo sound for granted, there was a very long period where broadcast audio and television with accompanying audio track were in mono. Over the decades, multiple standards were developed that provide a way to transmit and receive two mono tracks, as a proper stereo transmission. In a recent video, [Matt] over at [Matts Tech Barn] takes a look at the German Zweikanalton (also known as A2 Stereo) standard, and compares it with the NICAM standard that was used elsewhere in the world.

Zweikanalton is quite simple compared to NICAM (which we covered previously), being purely analog with a second channel transmitted alongside the first. Since it didnt really make much of a splash outside of the German-speaking countries, equipment for it is more limited. In this video [Matt] looks at the Philips PM 5588 and Rohde & Schwarz 392, analyzing the different modulations for FM, Zweikanalton and NICAM transmissions and the basic operation of the modulator and demodulator equipment.

An interesting aspect of these modulations are the visible sidebands, and the detection of which modulatio...

12:23

Books: Hundreds of books created by artificial intelligence (AI) tool ChatGPT are flooding Amazon, showing the way the technology can be adopted to produce books at scale Lifeboat News: The Blog

Hundreds of books created by artificial intelligence (AI) tool ChatGPT are flooding Amazon, showing the way the technology can be adopted to produce books at scale.

Nearly 300 titles that claim to be written solely by or in collaboration with ChatGPT are listed on the online booksellers website, across a range of genres including non-fiction, fantasy and self-help.

Many of the books appear to be published using Amazons Kindle Direct Publishing tool, which allows users to quickly create, publish and promote their work using a modern-day equivalent of the self-publishing model.

12:23

On the Origin of Time: Stephen Hawkings mind-blowing final theory Lifeboat News: The Blog

Everything, everywhere, all at once? Forget it there are ideas about time far more outrageous than simply the multiverse Who knows where the time goes? asked Sandy Denny, though as good a question is where it came from in the first place.

12:22

A Leaning Tower of Pisa-Sized Asteroid Will Sweep Lifeboat News: The Blog

A newly discovered asteroid called 2023 DW has generated quite a buzz over the past week due to an estimated 1-in-670 chance of impact on Valentines Day 2046. But despite a NASA advisory and the resulting scary headlines, theres no need to put an asteroid doomsday on your day planner for that date.

The risk assessment doesnt have as much to do with the probabilistic roll of the cosmic dice as it does with the uncertainty thats associated with a limited set of astronomical observations. If the case of 2023 DW plays out the way all previous asteroid scares have gone over the course of nearly 20 years, and further observations will reduce the risk to zero.

Nevertheless, the hubbub over a space rock that could be as wide as 165 feet (50 meters) highlights a couple of trends to watch for: Were likely to get more of these asteroid alerts in the years to come, and NASA is likely to devote more attention to heading off potentially dangerous near-Earth objects, or NEOs.

11:22

Kernel prepatch 6.3-rc3 LWN.net

The 6.3-rc3 kernel prepatch is out for testing. "So rc3 is fairly big, but that's not hugely usual: it's when a lot of the fixes tick up as it takes a while before people find and start reporting issues."

11:14

DistroWatch Weekly, Issue 1011 DistroWatch.com: News

This week in DistroWatch Weekly: Review: Serpent OS, Security Onion 2.3, and Gentoo LiveNews: Canonical offers "Pro" support for aging Ubuntu 18.04, openSUSE sees surge in downloads, Debian runs election with one potential Project LeaderQuestions and answers: Replacing the scp utilityReleased last week: Qubes OS 4.1.2, Kali Linux....

11:07

How a Beam of Pellets Could Blast a Probe Into Deep Space SoylentNews

Researchers seek to develop advanced propulsion systems that can transform long-distance space exploration:

If you want a spacecraft that can explore beyond the solar systemand you don't want to wait decades for it to get thereyou need one that can really move. Today's chemical rockets and solar-powered probes are downright poky on interstellar scales. Artur Davoyan has a completely different idea for how to accelerate a spacecraft to extreme speeds: pellet-beam propulsion.

Here's the gist of how it would work: First, you actually need two spacecraft. A probe blasts off on a one-way trip to deep space, while a second vehicle remains locked in an Earth orbit and fires thousands of tiny metallic pellets at its partner every second. The orbiting craft also either fires a 10-megawatt laser beam at the retreating probe, or aligns a laser fired from the ground at it. The laser hits the pellets, heats them, and ablates them, so that part of their material melts and becomes plasmaa hot cloud of ionized particles. That plasma accelerates the pellet remnants, and this pellet beam provides thrust to the spacecraft.

Alternatively, Davoyan thinks the probe could get thrust from the pellet beam if the craft were to deploy an on-board magnetic field-generating device to deflect the pellets. In this case, that magnetic action would push the craft forward.

Such a system could boost a 1-ton probe to speeds up to 300,000 miles per hour. That's slow compared to the speed of light, but more than 10 times faster than conventional propulsion systems.

It's a theoretical concept, but realistic enough that NASA's Innovative Advanced Concepts program has given Davoyan's group $175,000 to show that the technology is feasible. "There's rich physics in there," says Davoyan, a mechanical and aerospace engineer at UCLA. To create propulsion, he continues, "you either throw the fuel out of the rocket or you throw the fuel at the rocket." From a physics perspective, they work the same: Both impart momentum to a moving object.


Original Submission

Read more of this story at SoylentNews.

11:00

HPR3816: Post Apocalyptic 4s5 Battery Pack Hacker Public Radio

HR000000000 H Hybrid: Denotes some prepurchased or hard to find components R Robotics: suitable for robots buy: 4s 40A BMS https://www.aliexpress.com/item/4000025857655.html (can't specifically vouch for this vendor, just chose the first that came up) make sure to choose 4s and balance find or buy materials: duct or gorilla tape, trashed computer dvd or cd drive, 20 18650 cells, molex connectors(you can also use barrel jacks or whatever you want to transfer power), wire and maybe 'tab wire' https://nl.aliexpress.com/item/32650006768.html solder everything together as per schematic and pictures (there is theoretically a danger in soldering cells, but I have never had a problem. Have a pair of pliers and a nearby window handy to throw them out of if anything goes wrong) wrap in cardboard and tape as per pictures add the cd/dvd drive lids(if you taped well you won't short anything and burn your house down tape dvd lids to battery Getting into the battery for maintenance just requires a utility knife. Watt Hour does a great job describing the 3s BMS, which is very similar to the 4s used in my case: https://yewtu.be/watch?v=QNENyu97w2A Battery Schematic Click the thumbnail to see the full-sized image Cut through tape to reveal battery Click the thumbnail to see the full-sized image Flat metal holds cells together Click the thumbnail to see the full-sized image Detail of 4.2v Click the thumbnail to see the full-sized image Only have to desolder one side Click the thumbnail to see the full-sized image New cells in Click the thumbnail to see the full-sized image Make sure there is thick tape covering battery

K-12 Computing Education in Four African Countries It Will Never Work in Theory

For a few months in 2021 and 2022, it looked like technical conferences might start being more globally inclusive. COVID-19 restrictions meant that even people from affluent countries couldn't travel, so there was finally an effort to create a level playing field for remote attendance. It didn't last: all of the conferences I might have attended this year provided off-site options, but none of them included all of their talks, workshops, and gatherings. My colleagues in Latin America and Africa are therefore shut out of the conversation once again because of visa issues, travel costs, and a dozen other obstacles. As one of them said to me in frustration, "If people from Google and Stanford had to deal with this shit, the ACM would make Zoom conferences mandatory."

People from less affluent regions of the world are often left out of research as well: as that same colleague observed, there have probably been more studies of how students in Washington State program than of students from the whole of Latin America. This paper is a step toward closing that gap. In it, the authors present results from a survey of computer science educators in four African countries and compare them both to each other and to more affluent countries. Barriers to professional development are reported alongside what people actually teach, and some shortcomings of the analysis framework itself are discussed. The authors intend to repeat their survey in coming years, and I look forward to reading those sequels.

Ethel Tshukudu, Sue Sentance, Oluwatoyin Adelakun-Adeyemo, Brenda Nyaringita, Keith Quille, and Ziling Zhong. Investigating K-12 computing education in four African countries (Botswana, Kenya, Nigeria, and Uganda). ACM Transactions on Computing Education, 23(1):129, Jan 2023. doi:10.1145/3554924.

Motivation. As K-12 computing education becomes more established throughout the world, there is an increasing focus on accessibility for all, whether in a particular country or setting or in areas of the world that may not yet have computing established. This is primarily articulated as an equity issue. The recently developed capacity for, access to, participation in, and experience of computer science education (CAPE) Framework is one way of demonstrating stages and dependencies and understanding relative equity, taking into consideration the disparities between sub-populations. While there is existing research that covers the state of computing education and equity issues, it is mostly in high-income countries; there is minimal research in the context of low-middle-income countries like the sub-Saharan African countries.

Objectives. The objective of the article is therefore to report on a pilot study investigating the capacity (...

10:05

(Even more) Aggressive randomisation of stack location OpenBSD Journal

In a late-stage addition prior to the release of OpenBSD 7.3, Mark Kettenis (kettenis@) has committed [more] aggressive randomisation of the stack location for all 64-bit architectures except alpha:

Read more

10:00

Hackaday Links: March 19, 2023 Hackaday

Hackaday Links Column Banner

We get results! Well, sort of. You may recall that in this space last week we discussed Fords plans to exclude AM reception on the infotainment systems of certain of their cars starting in 2024. We decried the decision, not for the loss of the sweet, sweet content that AM stations tend to carry although we always enjoyed Traffic on the 8s back in our dismal days of daily commuting but rather as a safety concern, because AM radio can reach almost the entire US population with emergency information using just 75 stations. To our way of thinking, this makes AM radio critical infrastructure, and eliminating it from motor vehicles is likely to have unintended consequences. Now it seems like theres some agreement with that position, as former administrators of FEMA (Federal Emergency Management Administration; and no, not FEDRA) have gotten together to warn about the dangers of deleting AM from cars. Manufacturers seem to be leaning into the excuse that EVs emit a lot of radio frequency interference, rendering static-sensitive AM receivers less useful than other, more profitable less susceptible modes, like digital satellite radio. Th...

09:56

rpki-client 8.3 released OpenBSD Journal

One small but significant step for routing security on the Internet happened Sunday 19th of March 2023 with the "https://man.openbsd.org/rpki-client.8">rpki-client.

The announcement reads,

Subject:    rpki-client 8.3 released
From:       Sebastian Benoit <benno () openbsd ! org>
Date:       2023-03-19 12:46:27

rpki-client 8.3 has just been released and will be available in the
rpki-client directory of any OpenBSD mirror soon.

rpki-client is a FREE, easy-to-use implementation of the Resource
Public Key Infrastructure (RPKI) for Relying Parties (RP) to
facilitate validation of BGP announcements. The program queries the
global RPKI repository system and validates untrusted network inputs.
The program outputs validated ROA payloads, BGPsec Router keys, and
ASPA payloads in configuration formats suitable for OpenBGPD and BIRD,
and supports emitting CSV and JSON for consumption by other routing
stacks.

Read more

09:30

Google <3 OnlineTools.com catonmat.net

Google truly loves OnlineTools.com. All traffic just open.

See you next time!

07:56

Linux 6.3-rc3 Released: It's "Fairly Big" Phoronix

Linus Torvalds just released Linux 6.3-rc3 as the latest weekly test candidate for the in-development Linux 6.3 kernel that is slated to debut as stable toward the end of April...

07:27

Filmmakers Want Owner of Defunct VPN Arrested in Piracy Case TorrentFreak

liquidvpnOver the past two decades, online piracy has proven a massive challenge for the entertainment industries.

Some copyright holders have pursued legal action against individual pirates, but today its not uncommon for third-party intermediaries to also be considered legitimate targets.

Over the past several years, internet service providers, hosting companies, and VPN providers have faced infringement liability lawsuits. Most of the VPN companies chose to settle disputes but when LiquidVPN was sued, the provider simply ignored the lawsuit.

Filmmakers Win $15m in LiquidVPN Lawsuit

LiquidVPN was previously owned by David Cox, who was initially listed as a defendant. As the case progressed it emerged that Cox had sold the VPN provider before the lawsuit was filed, with Puerto Rico company 1701 Management identified as the buyer.

Despite facing serious allegations, 1701 Management and its alleged owner, Charles Muszynski, failed to answer the claims filed at a federal court in Florida. This prompted the film companies to request a default judgment of more than $15 million, which was eventually granted a year ago.

The default judgment marks the end of the road on the question of liability but doesnt necessarily mean that the filmmakers automatically get the money. As it turns out, that can be quite a challenge.

Chasing The Money

Over the past several months, the filmmakers attorney Kerry Culpepper has submitted several writs of garnishment to the court. Through these requests, the court can order the seizure of property owned or controlled by the debtors.

In this case, those efforts targeted a yacht, docked at a Florida harbor, and various other types of properties. In addition, the filmmakers obtained a worldwide restraining order against the assets of Mr. Muszynski, 1701 Management, and the third defendant AUH2O.

This hunt for assets connected several companies to Muszynski, including the New Mexico company WasteResources LLC. According to the legal paperwork, there is evidence to show that the company is owned and controlled by the defendant.

...

07:00

The $50 Pen Plotter Hackaday

[Arca] sets out to build himself a low-cost pen plotter that doesnt require access to a 3D printer. The plotter uses a coreXY arrangement, powered by 28BYJ-48 stepper motors, which he overdrives with +12 VDC to increase the torque. Pen up and down control is done using a stepper motor salvaged from a DVD reader. The frame is constructed using PVC electrical conduit and associated fittings, and [Arca] uses the hot glue gun quite liberally. Steppers were driven by A4988 modules with heatsinks, and motion control is provided by GRBL running on an Arduino UNO.

He has a few issues with glitches on the limit switches, and is continuing to tweak the design. There is no documentation yet, but you can discern the construction easily from the video if you want to try your hand at making one of these. This is a really cool DIY plotter, and many parts you probably have laying around your parts boxes. As [Arca] says, its not an AxiDraw, but the results are respectable. Keep a lookout for part 2 of this project on his YouTube channel.

...

06:24

Globalization is Over, According to TSMC Founder SoylentNews

Free trade not quite as dead, 'but it's in danger' says Morris Chang:

Globalization is over, at least for the chip industry, and this will mean higher chip prices, according to semiconductor contract manufacturer giant TSMC. Despite this, the company's founder said he supports US actions to slow the development of China's chip technology.

The Taiwanese chip company is caught up in the ongoing semiconductor battle between the superpowers, where the US is trying to prevent China from getting access to cutting edge technology that might be used by its burgeoning military. At least, that is the reason given.

At an event hosted by Taiwan's CommonWealth Magazine in Taipei, retired TSMC founder Morris Chang said that efforts to contain China were leading to a split in the global supply chain that would likely increase prices and could have an effect on chip availability.

"There's no question in my mind that, in the chip sector, globalization is dead. Free trade is not quite that dead, but it's in danger," Chang said.

[...] It has already been noted that US efforts to isolate China are leading to an undoing of the distributed global supply chain infrastructure that has built up over the past few decades.

Richard Gordon, practice vice president for semiconductors and electronics at Gartner, told us earlier this year the outcome may be a world divided into China-centric and US-Europe-centric networks of supply chains and a greater self-reliance within those blocks.

Meanwhile, TSMC is also discussing subsidies with officials for the German state of Saxony about a new fabrication plant the chip giant is aiming to build there, despite publicly stating in December that it had no plans to site any facilities in Europe.


Original Submission

Read more of this story at SoylentNews.

05:57

Monitoring the QO-100 WB transponder usage with Maia SDR Daniel Estvez

I am interested in monitoring the usage of the QO-100 WB transponder over several weeks or months, to obtain statistics about how full the transponder is, what bandwidths are used, which channels are occupied more often, etc., as well as statistics about the power of the signals and the DVB-S2 beacon. For this, we need to compute and record to disk waterfall data for later analysis. Maia SDR is ideal for this task, because it is easy to write a Python script that configures the spectrometer to a low rate, connects to the WebSocket to fetch spectrometer data, performs some integrations to lower the rate even more, and records data to disk.

For this project Ive settled on using a sample rate of 20 Msps, which covers the whole transponder plus a few MHz of receiver noise floor on each side (this will be used to calibrate the receiver gain) and gives a frequency resolution of 4.9 kHz with Maia SDRs 4096-point FFT. At this sample rate, I can set the Maia SDR spectrometer to 5 Hz and then perform 50 integrations in the Python script to obtain one spectrum average every 10 seconds.

Part of the interest of setting up this project is that the Python script can serve as an example of how to interface Maia SDR with other applications and scripts. In this post I will show how the system works and an initial evaluation of the data that I have recorder over a week. More detailed analysis of the data will come in future posts.

The Python script Im using can be found here. It uses the Python requests package to configure Maia SDR using its REST API, the websockets package to connect to the spectrometer WebSocket, and NumPy to average groups of 50 spectra together and write them to a file, as well as writing timestamps to another file. Dealing with the spectrometer WebSocket is really simple. Each message provides a 4096-point spectrum (in linear unit), which we can convert to a NumPy array by doing

np.frombuffer(await ws.recv(), 'float32')

The script produces two output files: a file with the spectrum data in float32 format, and a file with the timestamps in datetime64[ns] format.

I have set up a Pluto in my shack connected to the 750 MHz IF of my QO-100 groundstation. A LimeNET board that I had around is acting as USB to Ethernet bridge, but any Raspberry P...

05:34

Read "Building Commercial Space Infrastructure" (PDF) by our Alex Thatcher and Keith Taggart. Lifeboat News

Read "Building Commercial Space Infrastructure" (PDF) by our Alex Thatcher and Keith Taggart.

04:54

Lowes Market chain leaves client data up for grabs Security Affairs

A misconfiguration on a website owned by the US-based Lowes Market grocery store chain could have allowed threat actors to gain control of its systems.

On February 7, the Cybernews research team discovered a misconfiguration on the Lowes Market website. The supermarket chains website was leaking a treasure trove of private credentials, which left the company vulnerable to potential attacks by cybercriminals.

Together, the compromised credentials could enable an unscrupulous hacker to gain control of most of the online stores functionality, see sensitive customer information, and abuse access to paid services, all while putting Lowes Market customers at risk.

With almost 150 locations, the Lowes chain primarily operates stores in Texas, New Mexico, Colorado, Arizona, and Kansas.

At the time of writing, the company has already fixed the issue. Cybernews reached out to Lowes Market regarding the details of the misconfiguration and the possible duration of data exposure. However, the company has yet to provide a response to the inquiry.

Access to databases

Researchers found a publicly accessible environment file (.env) hosted on the Lowes Market website. Public access to the file posed a risk to the security of the companys systems, as it was leaking sensitive data and numerous credentials.

An examination of the environment file suggests that the developers were not following the best practices, while poor security configurations might have led to more secrets, an industry term for vital data that should be kept private, being exposed.

The leaked secrets could have allowed threat actors to access databases as the hosts, usernames, and ports of main, tracking, legacy, recipe, and redis.io databases were exposed.

Database hosts and credentials are considered sensitive information, as they are used to access respective databases and their contents. In the case of Lowes Market, most database hosts are internet-connected, making it particularly easy for threat actors to access them.

04:00

The Intricacies of Starting a Rocket Engine Hackaday

Rockets are conceptually rather simple: you put the pointy bit upwards and make sure that the bit that will go flamey points downwards before starting the engine(s). Yet how to start each rocket engine type in a way thats both safe and effective? Unlike in the Wile E. Coyote cartoons, real-life rocket engines do not have a fuse you light up before dashing off to a safe distance. Rather they use increasingly more complicated methods, which depend on the engine type and fuels used. In a recent article written by [] with accompanying video featuring everyones favorite Everyday Astronaut [Tim Dodd], were taken through the intricacies of how flamey ends are made.

The least complicated are probabl...

03:29

Re: First result on google promotes insecure coding (XSS) Open Source Security

Posted by Georgi Guninski on Mar 19

No. Since this issue is already public, lol, let me see who from
the community contacts them first. btw, I strongly suspect there are
many more buggy tutorials.

02:49

LLVM 16.0.0 released LWN.net

Version 16.0.0 of the LLVM compiler suite has been released. As usual, the list of changes is long; see the specific release notes for LLVM, Clang, Libc++, and others linked from the announcement.

02:39

The FSF's Free Software Awards LWN.net

The Free Software Foundation has announced the recipients of this year's Free Software Awards:

  • Eli Zaretskii (advancement of free software)
  • Tad (SkewedZeppelin) (outstanding new free software contributor)
  • GNU Jami (project of social benefit)

02:25

How much fuel is left in this 20-year-old Mars orbiter? Lifeboat News: The Blog

Designing, building, and launching a spacecraft is hugely expensive. Thats why NASA missions to Mars are designed with the hope that theyll last as long as possible like the famous Opportunity rover which was supposed to last for 90 days and managed to keep going for 15 years. The longer a mission can keep running, the more data it can collect, and the more we can learn from it.

Thats true for the orbiters which travel around Mars as well as the rovers which explore its surface, like the Mars Odyssey spacecraft which was launched in 2001 and has been in orbit around Mars for more than 20 years. But the orbiter cant keep going forever as it will eventually run out of fuel, so figuring out exactly how much fuel is left is important but it also turned out to be more complicated than the NASA engineers were expecting.

Odyssey started out with nearly 500 pounds of hydrazine fuel, though last year it looked as if the spacecraft was running much lower on fuel than had been predicted.

02:24

NASAs Parker Solar Probe makes its 15th close flyby of the sun this St. Patricks Day Lifeboat News: The Blog

NASAs sun-touching Parker Solar Probe spacecraft will celebrate St. Patricks Day (March 17) by making another close approach to our star. While people all over Earth enjoy a cold beer, the spacecraft will brave blisteringly hot temperatures as high as 2,500 degrees Fahrenheit (1,400 degrees Celsius) as it makes its 15th close approach to the sun, or perihelion.

According to NASAs Parker Solar Probe website, (opens in new tab) the exact time of the close approach will be 4:30 p.m. EDT (2030 GMT) when the spacecraft comes to within around 5.3 million miles (8.5 million km) of the suns surface, the photosphere.

02:24

SpaceX now eyeing April for Starships 1st orbital launch, Elon Musk says Lifeboat News: The Blog

SpaceXs huge new Starship vehicle could launch on its first-ever orbital test flight a little over a month from now, if all goes according to plan.

SpaceX is now tentatively eyeing mid-to late April for that epic mission, which will lift off from the companys Starbase facility in South Texas.

02:24

This insertable 3D printer will repair tissue damage from the inside Lifeboat News: The Blog

Researchers at the University of New South Wales, Sydney, have developed a flexible 3D bioprinter that can layer organic material directly onto organs or tissue. Unlike other bioprinting approaches, this system would only be minimally invasive, perhaps helping to avoid major surgeries or the removal of organs. It sounds like the future at least in theory but the research team warns its still five to seven years away from human testing.

The printer, dubbed F3DB, has a soft robotic arm that can assemble biomaterials with living cells onto damaged internal organs or tissues. Its snake-like flexible body would enter the body through the mouth or anus, with a pilot / surgeon guiding it toward the injured area using hand gestures. In addition, it has jets that can spray water onto the target area, and its printing nozzle can double as an electric scalpel. The team hopes its multifunctional approach could someday be an all-in-one tool (incising, cleaning and printing) for minimally invasive operations.

The F3DBs robotic arm uses three soft-fabric-bellow actuators using a hydraulic system composed of DC-motor-driven syringes that pump water to the actuators, as summarized by IEEE Spectrum. Its arm and flexible printing head can each move in three degrees of freedom (DOFs), similar to desktop 3D printers. In addition, it includes a flexible miniature camera to let the operator view the task in real time.

02:24

Sciadv.abq5031 (2).Pdf Lifeboat News: The Blog

Microelectrode array for brain organoids.


Shared with Dropbox.

02:23

Anaximander review: Did Anaximander create science, asks Carlo Rovelli Lifeboat News: The Blog

Ancient philosopher Anaximanders discoveries about rain, wind and the cosmos may make him the true force behind modern science, argues physicist Carlo Rovelli in his newly republished first book.

By Simon Ings

02:23

Scientists in Singapore Have Discovered How to Talk to Plants Lifeboat News: The Blog

Plants emit weak electric signals. Researchers have developed a device to read and send signals back a type of plant communication.

02:23

The fifth force: Is there another fundamental force of nature? Lifeboat News: The Blog

In recent years, a group of Hungarian researchers have made headlines with a bold claim. They say theyve discovered a new particle dubbed X17 that requires the existence of a fifth force of nature.

The researchers werent looking for the new particle, though. Instead, it popped up as an anomaly in their detector back in 2015 while they were searching for signs of dark matter. The oddity didnt draw much attention at first. But eventually, a group of prominent particle physicists working at the University of California, Irvine, took a closer look and suggested that the Hungarians had stumbled onto a new type of particle one that implies an entirely new force of nature.

Then, in late 2019, the Hungarian find hit the mainstream including a story featured prominently on CNN when they released new results suggesting that their signal hadnt gone away. The anomaly persisted even after they changed the parameters of their experiment. Theyve now seen it pop up in the same way hundreds of times.

02:23

10 Quantum Myths That Need to be Busted Lifeboat News: The Blog

The very word quantum makes peoples imaginations run wild. But chances are youve fallen for at least one of these myths.

01:41

Intel's Xeon W9-3495X Can Draw 1,900W of Power SoylentNews

Intel's new HEDT CPU leaves behind Skylake-X in terms of power consumption:

Intel's recently introduced Xeon W9-3495X processor packs 56 cores begging you to overclock them, as the CPU also features an unlocked multiplier. When cooled down using liquid nitrogen, the 56-core processor can indeed be pushed to a formidable 5.50 GHz frequency, but at such high clocks it alone consumes almost 1,900 watts, more than beefy high-end gaming PCs, reports HardwareLuxx.

Elmor, a professional overclocker who collaborates with Asus, recently tried to push a Xeon W9-3495X 'Sapphire Rapids-SP' CPU on an Asus Pro WS W790E Sage SE motherboard to its limits with liquid nitrogen cooling. When frozen to -92.8 degrees Celsius/-135 degrees Fahrenheit, the CPU can work at 5.50 GHz and hit 132,220 points in Cinebench R23, which is just a little bit lower than the absolute record of 132,484 points set by another heavily overclocked Xeon W9-3495X. But the result comes at a cost.

The heavily overclocked Intel Xeon W9-3495X processor not only demonstrates phenomenal performance in Cinebench R23, but it also sets record in terms of power consumption. The CPU draws as much as 1,881W power when operating at 5.50 GHz and requires two 1,600W PSUs to feed it.

[...] Without any doubts, hitting 5.50 GHz with a 56-core Xeon W9-3495X processor cooled down using liquid nitrogen is a monumental achievement. Yet, it remains to be seen what makers of boutique factory-overclocked extreme workstations manage to squeeze out of this CPU with a production-grade cooling system and guaranteed long-term stability.


Original Submission

Read more of this story at SoylentNews.

01:20

Libreboot 20230319 Released With ThinkPad T530/W530 Support Phoronix

Libreboot 20230319 has been released as the downstream of Coreboot focused on providing only pure open-source firmware replacements to proprietary BIOS/UEFI platforms compared to all the blobs permitted in upstream Coreboot...

01:01

Re: First result on google promotes insecure coding (XSS) Open Source Security

Posted by Solar Designer on Mar 19

Georgi, are you part of the community? Do you have a plan you're going
to follow yourself or/and recommend to others? If so, please share it.

It's easy to distance yourself from the community and criticize it, or
to claim there isn't a community like you seem to imply by the quotes.

It's more effort to be part of the community and actually do things.

Sometimes this involves figuring out the author's contact address...

01:00

3D-Printed Shredder Eats Lettuce For Breakfast Hackaday

Shredding things isnt just good for efficiently and securely disposing of them. Its also very fun, as well. [Joonas] of [Lets Print] didnt have a shredder, so set about 3D printing one of their very own.

The design apes that of the big metal trash shredders youve probably seen in videos all over the internet. They use a pair of counter-rotating drums with big teeth. As the drums turn, the teeth grab and pull objects into the gap between the drums, where they are duly torn apart into smaller pieces.

In this design, plastic drums are pressed into service as [Joonas] does not have a metal 3D printer. A brushed DC motor is used to drive the shredder. A large multi-stage gearbox is used to step down the motors output and provide plenty of torque to do the job.

The shredder gets tested with ple...

00:42

Linux 6.3-rc3 Adding Protection From Malicious Guests Hammering AMD's Secure Processor Phoronix

A change sent in this Sunday ahead of the Linux 6.3-rc3 release is a late addition adding a throttling mechanism to protect the hypervisor from potentially malicious AMD Secure Encrypted Virtualization (SEV) guests. The change is to protect the AMD Secure Processor from being potentially overloaded with requests by nefarious guest VMs...

00:21

First result on google promotes insecure coding (XSS) Open Source Security

Posted by Georgi Guninski on Mar 19

"tutorial python cgi" returns as first result [1]
on tutorialspoint.com

In "Simple URL Example:Get Method"

```
first_name = form.getvalue('first_name')
last_name = form.getvalue('last_name')
print "<h2>Hello %s %s</h2>" % (first_name, last_name)
```

Besides cgi tutorial, this is XSS and CSRF tutorial by example.

Does the so called security "community" plan to reduce...

00:20

Serpent OS Build Infrastructure Launched Phoronix

Serpent OS as the new Linux distribution project by Solus Linux founder Ikey Doherty has made public its build infrastructure as it begins building more packages and opening up packaging work to outside contributors...

00:18

NBA is warning fans of a data breach after a third-party newsletter service hack Security Affairs

The NBA (National Basketball Association) disclosed a data breach after a third-party firm providing a newsletter service was breached.

The NBA (National Basketball Association) is notifying followers of a data breach after a third-party company providing a newsletter service was breached.

The National Basketball Association (NBA) is a professional basketball league in Northern America composed of 30 teams (29 in the United States and 1 in Canada). It is one of the major professional sports leagues in the United States and Canada and is considered the premier mens professional basketball league in the world.

NBA launched an investigation into the security breach with the support of external cybersecurity experts to determine the extent of the incident.

The NBA pointed out that its systems were not impacted, according to the data breach notification sent to the fans, the incident affected an unknown number of individuals.

BleepingComputer, which first reported the news, confirmed that some fans personal information was stolen.

According to the association, an unauthorized third party accessed and created copies of the names and email addresses of some of its fans. The data breach did not compromise usernames, passwords, and other information.

We recently became aware that an unauthorized third party gained access to, and obtained a copy of, your name and email address, which was held by a third-party service provider that helps us communicate via email with fans who have shared this information with the NBA, reads the data breach notification, as reported by BleepingComputer.

There is no indication that our systems, your username, password, or any other information you have shared with us have been impacted.

Even if credentials were not exposed as a result of this incident, fans must be vigilant for phishing attacks and other fraudulent activities that could target them by abusing the exposed information.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs  hacking, NBA)

The post...

00:15

Registration And Verification On The Mostbet Website h+ Media

Registration And Verification On The Mostbet Website

The app features a user-friendly interface and an intensive choice of fee and bonuses systems. The amount of sports supported is excessive and there are plenty of chips which you should use to increase your comfort and capital. Further, these bonuses differ only in the wagering guidelines, which mostbet clients can learn within the promotions part about.

The best method to clear up all of your troubles with playing and enjoying on line on line casino video games is to contact the help staff of Mostbet. There is a intensive number of the best way to get into conversation with Mostbet managers. Furthermore, the Geopoll Survey found that 79 p.c of bets positioned in Kenya are on football games, making the nation the main in football betting. In 2018, Kenyans went on-line of their numbers and searched for betting and sports-related sites, a new report has confirmed. A massive 11 of the highest 20 Google search queries have been immediately related to betting. Whilst the rest wager largely as soon as a month, a majority of Kenyans guess as quickly as every week with sports betting, particularly football being essentially the most most popular.

The Android os and iPhone apps can be found for download on the options of the game, plus the capability to bet on in style events. You may even change your quick bet amount and watch the betting options and obtainable odds. [newline]To set up the appliance, enter the Mostbet web site, after that a working obtain hyperlink might be displayed, then observe the hyperlink, obtain and register. In addition to themed slots, yow will discover lots of desk video video games at this firm. They at the moment are on the market to clients from Norway in a brand new format.

Many new customers now using the companys service regularly have used the simple steps from the instructions under. This category can give you a wide selection of hand types that influence the difficulty of the recreation and the size of the winnings. Sites strategies of replenishment.The withdrawal is on the market solely after verification of the account utilizing one of many listed methods. With that, you even have Indian keep on line on line casino games like Andar Bahar and Teen Patti! You might uncover different well-liked video video games like Sic Bo, Lucky 7, Deal or No Deal, et cetera.

GeoPoll earlier this year performed a research where it estimated that over 50% of earnings by youth consumers is spent on personal care. The report notes that an excellent of millennials in Sub-Saharan Africa are utilizing their cell phones to wager on football spending no more than $50USD per 30 days. Free and low-cost practice video games are supplied by many of the largest on-line betting features to assist players enhance their betting abilities. As a outcome, customers may experiment with varied video...

00:12

Mostbet Betting Guidelines h+ Media

Mostbet Betting Guidelines

After successful registration in Mostbet, the bettor can replenish the stability and place bets. In order to have the power to freely withdraw money from the sport account in the future, you need to affirm your e-mail. To do this, youll need to enter the code obtained in a particular letter.

I advise you to bet with Mostbet if you should see your money after successful, as a outcome of many bookmakers simply block accounts without the reasons now. Without an account, you wont have the ability to use some features, together with working with the financial transfers and putting bets. In the world of gambling, there are specific guidelines and necessities for his or her participants. Compliance with these guidelines and requirements ensures the safety of the participant and provides him with ample alternatives. When betting on sports, be certain to observe the suggestions of the bookmaker to keep away from any misunderstandings.

We love certainty and so do you, we ship exceptional companies to ensure that your peace of mind is where it ought to be, having fun with the moment! Hence, I favor to get lovers in a metropolis not distant from our house. Thus, this wont problems touring talkwothstranger for a distance of some lengthy distances to savor a scorching meetup. Dont really feel lazy and search for your personal luck significantly away from rut, and as well as the webpages is great for an individual. To proceed chatting with the equivalent individual, sign-up as a member.

Ghana has the least quantity at forty two percent, stated the 2017 Geopoll Survey on Gambling within the SSA area. It all is decided by how well-balanced a united workforce the gambler creates. This could be carried out on the website or in the software kind by filling out a small kind. The match of interest may be found through the search bar furthermore. Unlike different bookmakers, Mostbet wont indicate the quantity of matches for each discipline in the list of sports within the LIVE phase..

Processing adverse and optimistic opinions help us identify areas for progress and efficiently implement cutting-edge cures. Complete the registration by simply clicking the button at the end routinely adjusts to the monitor diagonal, making it the most user-friendly. Very usually the most effective player within the event is about by the top of the match. It is a guess on the handicap with that your united team which the bet was placed must win.

In order to win some big cash and are assured in inabilities, you should select these particular bets. Many users observe that every one strategies work flawlessly, you presumably can withdraw the winnings as quickly as attainable. A guess made for quantities 20 occasions the scale of the first deposit.

Although the stakes arent yet excessive, all the signs are there...

00:12

Bedava Bonus h+ Media

Bedava Bonus

Fortunately that the company permits the bettors to replenish the accounts by the use of quite lots of options so that they acquire their Mostbet promo code Bangladesh sooner. Targeting the most effective player in the nation and top-of-the-line strikers on the earth is simply another show of energy. Another instance of Man City flexing their muscular tissues, exhibiting their financial clout. The most popular on-line sportsbooks definitely assume so with Man City priced as favourites to win the league and favourites to win the Champions League this season. The fixture list has been printed with the curtain going up on Friday 13 August at Carrow Road when Norwich City host Arsenal. The Gunners are favourites with bookies featured at Onlinesportsbetting to get off the mark with a win, however Mikel Artetas aspect isnt expected to challenge for the title.

Unlike youth in different African nations, most Kenyan youth guess as soon as a week spending about $50 per 30 days totally on football bets. Youth elsewhere spend less than 50USD a month and most wager only once a month. The bonuses introduced to the purchasers are numerous and each bettor is eligible to the kinds of incentives. No matter for how long a player stays with the bookmaker because there is always a Mostbet bonus code each for latest and long-term punters. Under no circumstances anticipation each wager or slot machine game game hype again a detailed proportion presumably.

The official website is legally managed and welcomes customers from Bangladesh over 18 years old. Jackpot Place could be licensed by the Kahnawake Video gaming Payment moreover,the Malta Betting Experienced. Licensed Mostbet casino and bookmaker website for people from Bangladesh. Registration and login rules within the Mostbet official website.

At least up to now, there has not been a single case of punishment for betting on the Internet. In addition to this, the membership is registered in the territory of one other state the place such activity isnt prohibited. Moreover, the membership makes use of trendy dependable data encryption techniques, so your personal data will stay secure.

As for using Paypal together with different popular strategies, youll get data concerning this from the representatives of the sportsbook instantly. Practice shows that the consumer service of this ongoing company reaches the excessive stage. Mostbet will not track the place bonuses are put in, all players are on equal terms, the operational program is clear and simple.

The bookmakers office is in demo mode.If you learn the evaluations, the office is rated properly by the players, there are a lot of constr...

00:10

Kenya Leads Africa In Sports Betting And Gambling h+ Media

Kenya Leads Africa In Sports Betting And Gambling

The finest strategy to clear up all your troubles with taking half in and taking half in on line on line casino video games is to contact the help staff of Mostbet. There is a in depth number of the means in which to get into dialog with Mostbet managers. Furthermore, the Geopoll Survey found that seventy nine p.c of bets positioned in Kenya are on soccer games, making the nation the main in football betting. In 2018, Kenyans went online in their numbers and searched for betting and sports-related websites, a model new report has confirmed. A massive 11 of the top 20 Google search queries had been instantly associated to betting. Whilst the remaining bet principally once a month, a majority of Kenyans guess as quickly as every week with sports activities betting, particularly soccer being the most most well-liked.

Followers of Arsenal demand a giant season from their team, and theyll get a greater thought of what to anticipate in the coming months after this game. Since 2014, desertcart has been delivering a broad range of products to clients and fulfilling their desires. You will discover a number of optimistic reviews by desertcart customers on portals like Trustpilot, and so on. The website makes use of an HTTPS system to safeguard all clients and defend financial details and transactions carried out online.

As its a chat web site made for hip and stylish members, most individuals who use their service are younger individuals from the age group 18 to 24. I tried some a number of matchmaking corporations, nevertheless this option seems first fee in the intervening time. Gambling house fleas the specific talked about bins you want to probably full the evaluation approach beforehand. Or, its true that the majority of individuals strat to register in betting websites bd.

Yes, the 2 of you require a more elaborate dialog for an understanding that is clear. In addition, usually you ought to talk with him, which might be uncomfortable ashley madison kortingscode for every of you. The bet may be canceled due to technical issues on the bookmakers side. The bookmaker reserves the right to refuse to accept a bet without giving a reason. The personal info offered in the registration form should be true. It just isnt allowed for a similar person to register with the identical bookmaker twice.

You can sign-up and use the chatroom to speak with different customers free of charge. The app is straightforward to use and has the identical functionalities as the positioning. Add your full name, begin date, location information, and group title, if any. All the members may be a half of the basic public chat rooms freed from charge. You can seek for a particular or be part of the actually useful one by the location.

The bookmakers office is in demo mode.If you learn the evaluations, the office is rated well by the avid gamers, there are lots of o...

00:01

FreeBSD 13.2-RC3 Released With OpenSSH 9.3, Major Performance Fix For Makefs Phoronix

The third and potentially last release candidate of FreeBSD 13.2 is now available for testing ahead of the planned stable 13.2-RELEASE around the end of March...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Sunday, 19 March

23:56

Distribution Release: SystemRescue 10.00 DistroWatch.com: News

Franois Dupoux has released a major update of SystemRescue, an Arch-based Linux distribution designed for administrating and repairing computer systems and rescuing data. branch, which is currently the latest long-term supported one. The changelog provides further....

22:00

Customizing the Start-Up Chime On a 1999 G3 iMac Hackaday

The start-up chime on Macs is probably as recognizable as the default Nokia ringtone in this day and age. Yet much like a ringtone, so too one might want to change the start-up chime on a Mac. This is something which [Doug Brown] has done in the past already on a Power Mac G3 in 2012, which made him instantly an expert on the topic in the eyes of a reader who wanted to know how to change the chime on a 1999 iMac. While the firmware on both these systems is written in Forth, it did take a bit of sleuthing to figure out where the chime was hiding in the firmware image, and how to change it.

The target iMac is somewhat unique in that it has a G4 PPC CPU rather than the more common G3. The firmware is similar enough that it was a snap to simply search the newer iMacs firmware for the signature of the chime sound data. This turned out to be the identical QuickTime IMA ADPCM format-encoded data, yet what was different was how this data was integrated into the firmware image. Key is finding the area in the firmware where not only the address of the chime datas start is defined, but also its length. Finally, the checksums in the firmware image have to be updated so that it matches the patched data.

Reverse-engineering the checksum calculation in the Forth code turned out to be fairly straightforward, but getting the new firmware on the iMa...

21:51

Nearly 200 Banks at Risk for Same Fate as Silicon Valley Bank cryptogon.com

Via: New York Post: Nearly 200 more banks may be vulnerable to the same type of risk that took down Silicon Valley Bank: The value of the assets they hold. There are 186 banks across the country that could fail if half of their depositors quickly withdraw their funds, a new study published on the []

21:03

Read "Shingles, Zostavax vaccination and risk of developing dementia: a nested case-control study -- results from the UK Biobank cohort" (PDF) coauthored by our Ruth Itzhaki. Lifeboat News

Read "Shingles, Zostavax vaccination and risk of developing dementia: a nested case-control study results from the UK Biobank cohort" (PDF) coauthored by our Ruth Itzhaki.

20:54

Sonys Using Lasers to Help Low-vision Users Take Pictures SoylentNews

Sony wants to help low-vision users enjoy photography by shining lasers in their eyes:

Giant frickin' laser beams get all the buzz and sci-fi love, but it's our little laser bros that are putting in the work: taking measurements, entertaining our cats, and now, in the case of a Sony camera, helping people with vision problems see clearly through an electronic viewfinder and take pictures.

Sony is working with fellow Japanese company QD Laser to release the HX99 RNV Retina Projection Camera kit, a compact camera with an add-on retinal laser housing for projecting the camera's focused live view image into the user's eye. The low-power laser projection is designed to effectively bypass the focusing of the eye, helping users with visual impairments like shortsightedness, farsightedness, or astigmatism see a clear image.

It uses Sony's existing DSC-HX99 compact camera, which is a somewhat middling model from 2018 with an 18-megapixel sensor and equivalent zoom lens of 24-720mm (30x magnification), combined with QD Laser's Retissa Neoviewer projector. According to QD Laser's specs, the Retissa Neoviewer uses an RGB semiconductor laser to display an image with an equivalent of 720p resolution and 8-bit color depth. This beamed image has an approximate 60-degree horizontal field of view with 60Hz refresh, and the housing's battery has an estimated four hours of battery life. Tragically, it charges via Micro USB instead of USB-C.


Original Submission

Read more of this story at SoylentNews.

20:30

Week in review: Kali Linux gets Purple, Microsoft zero-days get patched Help Net Security

Heres an overview of some of last weeks most interesting news, articles, interviews and videos: Samsung, Vivo, Google phones open to remote compromise without user interaction Several vulnerabilities in Samsungs Exynos chipsets may allow attackers to remotely compromise specific Samsung Galaxy, Vivo and Google Pixel mobile phones with no user interaction. Top 50 most impersonated brands by phishing URLs Finance, technology, and telecom brands were the most commonly impersonated industries, notably for the unprecedented access More

The post Week in review: Kali Linux gets Purple, Microsoft zero-days get patched appeared first on Help Net Security.

19:20

Re: TTY pushback vulnerabilities / TIOCSTI Open Source Security

Posted by Hanno Bck on Mar 19

Ok, good point. So disabling TIOCLINUX isn't an option.

Looking into it, maybe restricting any TIOCLINUX sub features that
implement anything related to selection would be a good option. The gpm
daemon runs as root anyway.

Do you see any risk left if
TIOCL_SETSEL
TIOCL_PASTESEL
TIOCL_SELLOADLUT
are no longer accessible to non-privileged processes?

19:00

Tiny PCB PiezoPiano Plays Just One Octave Hackaday

Grand pianos are beautiful instruments, but take up altogether too much space. Upright pianos are smaller, but still fairly hefty. When it comes to the PiezoPiano, though, we suspect nobody could complain about its diminutive size. Its a tiny thing with just one buzzy little octave for your playing pleasure.

The PiezoPiano is a single PCB device with a ATmega4809 running the show. It has eight buttons and eight piezo transducers that give you just one octaves range on the keyboard. Truth be told, thats only in one scale; youre not getting the whole twelve tones of flats and sharps included. And, when we say keyboard, we really mean tactile buttons. You get the drift. Its all assembled in a cute enclosure mimicking the shape of a real grand piano.

Fundamentally, its a cute little musical desktoy that reminds us greatly of the Stylophone. Impressively, though, those eight buzzers mean it has eight-note polyphony. Thats nothing to sniff at compared to all the monophonic synths out there. Its also available on Tindie if youd like to buy a kit off the shelf. Video after the break.

...

18:22

Read "Drug Screening Implicates Chondroitin Sulfate as a Potential Longevity Pill" by our Collin Ewald. Lifeboat News

Read "Drug Screening Implicates Chondroitin Sulfate as a Potential Longevity Pill" by our Collin Ewald.

16:49

Read "Osteopontin: Building Skeletons in Aging's Closet" by our Clinton "Cosmo" Mielke. Lifeboat News

Read "Osteopontin: Building Skeletons in Agings Closet" by our Clinton Cosmo Mielke.

16:07

20 years later, Second Life is launching on mobile SoylentNews

https://arstechnica.com/gaming/2023/03/20-years-later-second-life-is-launching-on-mobile/

Remember Second Life? The virtual world launched on the desktop web back in 2003 with 3D avatars and spaces for various social activities. Believe it or not, it has been running continually this entire timeand now it's coming to mobile for the first time.

In fact, this will be the first time that Second Life has expanded beyond the PC (across Windows, macOS, and Linux) in any form.

In a post to the virtual world's community web forum, a community manager for Second Life developer Linden Lab shared a video with some details about the mobile version's development, and announced that year.


Original Submission

Read more of this story at SoylentNews.

16:00

Annoying Cicada Magnet Is Nonetheless Authentic Hackaday

Weve all heard of those chirper devices that randomly make annoying noises for no other reason than sending people insane. This project from [Kousuke Saito] brings altogether more art to this idea, while still being quite annoying indeed.

The build is essentially a replica cicada. [Saito] was inspired to build the device as the sounds of the insect remind him fondly of the summer. His design consists of a 3D-printed housing that roughly approximates something like a cicada, with two wings attached to a central body. In this case, the layer lines of the 3D print actually added to the realism of the ersatz insect The housing is nicely painted to serve as an adequate simulacra to those who arent up on their entomology.

Inside, theres an ATTiny 85 paired with an MP3 playback module and a small speaker. Its charged with reproducing the noise of various cicadas. Its setup with an ingenious mechanism to switch it on. There are magnets installed in the base which allow it to stick to metallic objects. Theres also a switch in the bottom of the dev...

13:00

Building a Truss-Braced Model Airplane: Sense or Nonsense? Hackaday

Following NASAs recent results with truss-braced wing airplanes and the benefits this could bring to full-sized airplanes, [Think Flight] figured that if it helps with those airplanes, perhaps it may also be a boon for model airplanes. With the recent construction of a carrier airplane for smaller drones, he decided to give the concept a whirl to see whether it would make a difference compared to a regular wing design. This carrier airplane features a payload bay that can be opened in flight to release the drones stored inside it, making any potential increased payload capacity and improvements to the flight characteristics very welcome.

The truss-braced wing design has been studied by NASA and Boeing, with the design offering a high aspect ratio, not unlike the...

12:30

Keysight Digital Learning Suite streamlines and simplifies lab management Help Net Security

Keysight Technologies introduces the Keysight Digital Learning Suite, a new unified digital learning platform that provides university engineering educators and students with lab tools, resources, and courseware through a single, secure web interface. In response to demands for flexible learning options, universities are moving from in-person education to digital and hybrid learning models. Although these new models provide unprecedented flexibility for time and location, there are still challenges for engineering educators. They often find themselves More

The post Keysight Digital Learning Suite streamlines and simplifies lab management appeared first on Help Net Security.

12:25

NATO on bots, sockpuppets, and shills manipulating social media Geeking with Greg

NATO has a new report, "Social Media Manipulation 2022/2023: Assessing the Ability of Social Media Companies to Combat Platform Manipulation".

Buying manipulation remains cheap ... The vast majority of the inauthentic engagement remained active across all social media platforms four weeks after purchasing.

[Scammers and foreign operatives are] exploiting flaws in platforms, and pose a structural threat to the integrity of platforms.

The fake engagement gets picked up and amplified by algorithms like trending, search ranking, and recommenders. That's why it is so effective. A thousand sockpuppets engage with something new in the first hour, then the algorithms think it is popular and show crap to more people. I think there are a few questions to ask about this: Is it possible for social media platforms to stop their amplification of propaganda and scams? If it is possible but some of them don't, why not? Finally, is it in the best interest of the companies in the long-run to allow this manipulation of their platforms?

11:19

Humans (Mostly) Love Trash Robots SoylentNews

Simple robots wander NYC asking for trash and recycling, and it's adorable:

My favorite approach to human-robot interaction is minimalism. I've met a lot of robots, and some of the ones that have most effectively captured my heart are those that express themselves through their fundamental simplicity and purity of purpose. What's great about simple, purpose-driven robots is that they encourage humans to project needs and wants and personality onto them, letting us do a lot of the human-robot-interaction (HRI) heavy lifting.

In terms of simple, purpose-driven robots, you can't do much better than a robotic trash barrel (or bin or can or what have you). And in a paper presented at HRI 2023 this week, researchers from Cornell explored what happened when random strangers interacted with a pair of autonomous trash barrels in NYC, with intermittently delightful results.

What's especially cool about this, is how much HRI takes place around these robots that have essentially no explicit HRI features, since they're literally just trash barrels on wheels. They don't even have googly eyes! However, as the video notes, they're controlled remotely by humans, so a lot of the movement-based expression they demonstrate likely comes from a human sourcewhether or not that's intentional. [...]

Read more of this story at SoylentNews.

11:01

Researcher create polymorphic Blackmamba malware with ChatGPT HackRead | Latest Cybersecurity and Hacking News Site

By Deeba Ahmed

The ChatGPT-powered Blackmamba malware works as a keylogger, with the ability to send stolen credentials through Microsoft Teams.

This is a post from HackRead.com Read the original post: Researcher create polymorphic Blackmamba malware with ChatGPT

10:00

Calibrating Thermal Cameras With Hot Patterned Objects Hackaday

Thermal cameras are great if you want to get an idea of whats hot and whats not. If you want to use a thermal camera for certain machine vision tasks, though, you generally need to do a geometric calibration to understand what the camera is seeing and correct for lens distortion. [Henry Zhang] has shared various methods of doing just that.

...

09:02

BREIN Shut Down 449 Pirate Sites & Services in 2022 TorrentFreak

BREIN logoPredicting whether specific torrent sites, streaming portals, or IPTV services will still be around in five years time, is difficult at best. At worst, almost impossible.

Dutch anti-piracy group BREIN has been tackling pirates of all types for the last 25 years. Not only has it seen huge numbers come and go, BREIN can claim direct responsibility for thousands going offline. A relentless production line of pirate platforms means that BREIN being around in five years time seems easier to predict.

458 Investigations, 449 Sites/Services Removed

Published this week, BREINs annual report for 2022 covers enforcement actions carried out on behalf of rightsholders across most sectors, including movies, TV shows, music, games, and publishing.

BREIN says it completed 458 investigations in 2022, leading to 449 illegal sites/services being removed from the internet. BREIN refrains from publicly naming its targets but these figures certainly arent unusual. BREIN reported the shutdown of 349 infringing platforms in 2021 and 466 in 2020.

While sites returning under new branding may play some role in these persistently high numbers, the fact that full-blown pirate sites can now be deployed in minutes could be a more significant factor. But whatever the circumstances, BREIN has a tool for every occasion.

Preventing Big Sites From Getting Bigger

The Netherlands has long been associated with large piracy platforms but not necessarily because they were operated or hosted there. BREINs persistence on the legal front means that some of the largest torrent sites The Pirate Bay, RARBG, 1337x, YTS, EZTV, LimeTorrents and KickassTorrents variants are now dynamically blocked by major ISPs under the terms of a Website Blocking Covenant.

At the end of 2022, 196 proxies and mirrors were also blocked by IP address and/or DNS. BREIN further reports that an additional 328 proxies were stopped by other means last year.

Until relatively recently the sites mentioned above could still be found in Googles search results, but BREIN helped to change that too.

In cooperation with Google late 2021, Pirate Bay domains...

08:52

Kaspersky released a new decryptor for Conti-based ransomware Security Affairs

ransomware that is based on the previously leaked source code of the malware. the Conti ransomware based on previously leaked source code for the Conti ransomware.

In March 2022, a Ukrainian security researcher has leaked the source code from the Conti ransomware operation to protest the gangs position on the conflict.

After the leak of the source code, an unknown ransomware group attacks aimed at companies and state institutions.

In late February 2023, Kaspersky researchers uncovered a new portion of leaked data published on forums and noticed the presence of 258 private keys. The leak also included source code and some pre-compiled decryptors, which allowed the researchers to release

The malware variant whose keys were leaked, had been discovered by Kaspersky specialists in December 2022. This strain was used in multiple attacks against companies and state institutions. states Kaspersky.

The leaked private keys are located in 257 folders (only one of these folders contains two keys). Some of them contain previously generated decryptors and several ordinary files: documents, photos, etc. Presumably the latter are test files a couple of files that the victim sends to the attackers to make sure that the files can be decrypted.

The researchers added all 258 keys to the latest build of Kasperskys utility RakhniDecryptor 1.40.0.00. Users can download the decryptor from the Kasperskys No Ransom site.

 For many consecutive years, ransomware has remained a major tool used by cybercrooks. However, because we have studied the TTPs of various ransomware gangs and found out that many of them operate in similar ways, preventing attacks becomes easier. The decryption tool against a new Conti-based modification is already available on our No Ransom webpage. However, we would like to emphasize that the best strategy is to strengthen defenses and stop the attackers at early stages of their intrusion, preventing ransomware deployment and minimizing the consequences of the attack, said Fedor Sinitsyn, lead malware analyst at Kaspersky.

Be...

08:42

Read "The Ethics of Human Enhancement and Ferrando's Philosophical Posthumanism" by our Kevin LaGrandeur. Lifeboat News

Read "The Ethics of Human Enhancement and Ferrandos Philosophical Posthumanism" by our Kevin LaGrandeur.

07:00

Its a 486 Computer, On a Breadboard Hackaday

Ever since the 1970s, a frequent project has been to take a microprocessor and construct a computer system on a breadboard or stripboard. Usually these machines feature a familiar 8-bit processor such as a 6502 or a Z80 because of their breadboard-friendly DIP packages, but there is surprisingly little reason why some of the more recent silicon cant be treated in the same way. [FoxTech] is leading the way on this, by making a breadboard computer using an 80486DX.

A 1990-era 32-bit desktop CPU seems unpromising territory for this application, but its architecture is surprisingly accessible. It needs a breakout board to gain access to its various lines, but beyond that it can be interfaced to in a very similar way to those earlier chips.

So far there are two videos in the series, which weve placed below the break. The first one introduces the project and shows the basic set-up. A 486 running NOPs may produce a pretty light show, but as he starts to show in the second video, its capable of more. The eventual aim is to have a simple but fully functional breadboard computer, so hes starting with logic to decode the 32-bit bus on the 486 into the 8-bit bus hes going to use.

Its fascinating to learn about how the 32-bit 486 handles its interfacing and deals with four bytes at...

06:37

Asus Announces RISC-V Tinker Board Raspberry Pi Rival SoylentNews

Chances its Arm that maker community is looking for a fresh SBC:

Asus has unveiled a RISC-V model in its range of Tinker Board single board computer (SBC) systems, which up until now have all been Arm-based. However, it seems users should not expect too much in the way of performance from this first device.

The Tinker Board has been around since 2017 as Asus' answer to the Raspberry Pi, even keeping the same form factor and GPIO pinout in some models. Like the Pi, they have been based on various Arm-based system-on-chip (SoC) hardware.

Announced this week, the Tinker V is powered by a 64-bit RISC-V chip and aimed at embedded and IoT applications, but like other Tinker Boards and the Raspberry PI, is likely to find its way into the hands of makers and enthusiasts as well.

According to Asus, Tinker V "provides impressive power, comprehensive functionality and rich connectivity, making it the perfect choice for a diverse range of industrial IoT applications".

However, it is based on a 1GHz Renesas RZ/Five chip, which has just a single CPU core, the AX45MP designed by Andes Technology, whereas most rival products sport multiple processor cores.

Read more of this story at SoylentNews.

04:20

Half Of Americans Believe Media Intend To Mislead, Misinform cryptogon.com

Via: Summit News: A study has revealed new lows in terms of trust Americans have in the establishment media. The study by pollster Gallup and the Knight Foundation found that only a quarter of Americans have some level of favourability regarding the media, the lowest figure recorded for five years. The study also found that []

04:00

AMD P-State Guided Autonomous Mode Coming For Linux 6.4 Phoronix

While Linux 6.3 adds AMD P-State EPP as the "Energy Performance Preference" mode for enhancing the power/performance on recent Ryzen and EPYC systems on Linux, with Linux 6.4 the P-State Guided Autonomous Mode is coming to round out AMD's current CPU frequency scaling driver efforts...

03:58

Trump Says He Expects To Be Arrested On Tuesday cryptogon.com

Via: Reuters: Fox News anchor John Roberts informed viewers on Friday afternoon that the Manhattan District Attorneys Office has requested a meeting with law enforcement ahead of a potential Trump indictment. He said, to discuss logistics for some time next week, which would mean that they are anticipating an indictment next week. A spokesman []

03:31

US govt agencies released a joint alert on the Lockbit 3.0 ransomware Security Affairs

The US government released a joint advisory that provides technical details about the operation of the Lockbit 3.0 ransomware gang.

The U.S. Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing & Analysis Center (MS-ISAC) released a joint advisory that provides indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) associated with the notorious LockBit 3.0 ransomware.

The Federal Bureau of Investigation (FBI), CISA, and the Multi-State Information Sharing and Analysis Center (MS-ISAC) has released a joint cybersecurity advisory (CSA), #StopRansomware: LockBit 3.0. This joint advisory details known indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) that FBI investigations correlated with LockBit 3.0 ransomware as recently as March 2023. reads the advisory published by US agencies. LockBit 3.0 functions as an affiliate-based ransomware variant and is a continuation of LockBit 2.0 and LockBit.

The Lockbit gang has been active since at least 2019 and today it is one of the most active ransomware groups offering a Ransomware-as-a-Service (RaaS) model.

The LockBit 3.0 ransomware (aka LockBit Black) was launched in June 2022 and is a continuation of previous versions of the ransomware, LockBit 2.0 (released in mid-2021), and LockBit.

03:12

XCP-ng Initating Effort To Rewrite Xen Components In Rust Phoronix

The focus of this new effort isn't to immediately rewrite the Xen virtualization hypervisor in Rust but to begin gradually working toward rewriting some of the smaller Xen Project components in the Rust programming language and to see how everything pans out...

01:54

Maternal Deaths in the U.S. Keep Climbing SoylentNews

The COVID-19 pandemic contributed to the higher rate in 2020 and 2021:

An increasing number of U.S. women are dying during pregnancy or soon after giving birth, according to the latest data on the maternal mortality rate.

In 2021, there were 32.9 deaths per 100,000 live births, compared with 23.8 per 100,000 in 2020 and 20.1 in 2019, the National Center for Health Statistics reports March 16. The U.S. rate greatly exceeds those of other high-income countries. The total number of U.S. maternal deaths rose from 861 in 2020 to 1,205 in 2021.

There remains a wide disparity in the maternal mortality rate for Black women, at 69.9 deaths per 100,000 live births, compared with white women, at 26.6 per 100,000. Many social determinants of health underlie this gap, including differences in the quality of care that Black women receive before, during and after pregnancy.

The NCHS report doesn't discuss the reasons behind the increase for 2021. But COVID-19 contributed to a quarter of maternal deaths in 2020 and 2021, the U.S. Government Accountability Office reported in October. The pandemic also contributed to the mortality disparity between Black and white women, the GAO found, worsening existing structural inequities that lead to such issues as barriers to getting health care (SN: 4/10/20).

The U.S. maternal mortality rate has risen overall since 2018. The highest rate is among non-Hispanic Black women compared with Hispanic women and non-Hispanic white women.

The maternal deaths captured by the NCHS report are those that occur during pregnancy or within 42 days of the end of the pregnancy, "from any cause related to or aggravated by the pregnancy or its management." These causes include hemorrhaging, infections and high blood pressure disorders such as eclampsia.

The report excludes deaths after 42 days and up to the first year after birth. But 30 percent of pregnancy-related deaths occur during this period, the U.S. Centers for Disease Control and Prevention reported in September, from an analysis of the years 2017 to 2019.


Original Submission

...

Saturday, 18 March

23:38

Prime Spin And Win On-line Casinos In Kenya h+ Media

Prime Spin And Win On-line Casinos In Kenya

You ought to remember that the response times tend to be longer than using reside chat or cellphone assist. Browse the different varieties of video games obtainable at your most popular casino. Always choose only operators which are licensed by the gambling fee in Kenya. Here are our expert tips on how you can test and consider the Kenyan on line casino online gambling platforms.

A good casino will have at least one payment technique thats appropriate for you. This is a unbelievable vacation spot for slot machine fans, offering practically 70 completely different games. The casino is principally used by these staying in the adjoining lodge.

Online casinos in Kenya with free bonuses that we are recommending are 1XBet Kenya or 22Bet Kenya. Free spins on registration no deposit are precisely because the name suggests. The operator gives players real-money free spins for creating and verifying their accounts. We highlighted these above, slots free spins are bonus features designed into the game. The variety of spins you get also is decided by the slot, with some titles providing greater than one hundred in-game free spins. The majority of on-line casino operators let customers play their slots for free in demo mode.

Bingo can also be very fashionable and might supply some impressive prizes. Wed urge you to take a look at all sport types supplied at your chosen on line casino, as you can find one thing you absolutely love playing. [newline]Before you decide a factor or two about every available option. For starters, you may want to discover out extra about how online roulette for real money is totally different than free roulette video games. Well, every is slightly different by means of the monetary threat youll carry in addition to the accompanying game features.

When you play at a legit on line casino, you may be confident that the banking cashier is secure, enabling you to deposit safely. However, there are variations to be found across the assorted payment methods you can use. Whilst M-Pesa is a most well-liked option for many, there are some drawbacks to using it to make deposits at a Kenyan online on line casino. Another purpose why consumers are obsessive about online slots is the fun of taking part in them.

It is price keeping in thoughts nonetheless that the game selection on casino apps will usually be slightly smaller. This is because some older games havent been optimised for cellular gaming. Yet on the plus facet, the most popular video games and new releases are usually mobile-friendly, so the influence in your playing experience must be minimal. In your most popular Kenyan online on line casino, make positive you are aware of the available cost options before registering. Another factor that you just must also examine is whether or not or not the video games on the KE c...

23:35

What Is The Most Quantity I Can Win In A No h+ Media

What Is The Most Quantity I Can Win In A No

You can study so much just by trying at the sites customer-centric strategy via its customer support staff. A good web site should embody a number of methods of contacting the support team, and should have a pleasant help staff among other features. Jengacash is a simple-to-use website and doesnt provide extra games except for the spin wheel. Below, were going to see what its spin wheel is all about and the way to win on it.

Bonuses and promotions are a form of thanking you for choosing to play with them. In addition, some casinos require you to deposit cash to find a way to play. You will have a spread of choices for making an investment to be a winner in these games. While some casinos allow the deposit of bank card, other casinos require that you simply use the wire transfer methodology or a checkbook.

In this case, the on line casino randomly draws accounts and rewards these with this bonus. The bonus may also be chosen based on given standards at a particular time. In this occasion, specific accounts are recognized because of sure traits such as continued activity, in which case it additionally qualifies as a loyalty bonus. How you receive your free spins then is dependent upon the specific welcome bonus. We went through the totally different sorts of free spins somewhat earlier, but you will usually must make the primary deposit to get funds into your account.

Youll play with a real supplier, beamed to your display screen using a webcam, making this the most practical method to play on-line. Most websites provide a minimal of stay blackjack and roulette, plus baccarat and casino poker are also typically found in live casinos. The stakes are sometimes more expensive than standard on line casino video games though. There arent any legal guidelines that prohibit a player who is based in Kenya from becoming a member of a website and taking part in a recreation they get pleasure from. You could need to typically choose from reviewed and trusted online casinos.

When you play at a legit casino, you can be confident that the banking cashier is protected, enabling you to deposit safely. However, there are variations to be discovered across the various payment methods you ought to use. Whilst M-Pesa is a most well-liked choice for a lot of, there are some drawbacks to using it to make deposits at a Kenyan on-line casino. Another reason why shoppers are obsessive about online slots is the fun of playing them.

To facilitate the fast motion of cash out and in of your account, real money casinos have numerous cost options so that you can choose from. For occasion, when you bet one thousand dollars you would need to bet a minimum of ten thousand dollars in order to match the bonus. While these bonuses can definitely assist you to to start out out with nonetheless they receivedt help you get started on the proper path to gambling and w...

23:35

High Actual Money On-line Casinos In Kenya 2022 h+ Media

High Actual Money On-line Casinos In Kenya 2022

For Kenyans who want to play actual money casino games, payment options are a significant consider deciding the place to play. Whilst most casinos will let you deposit using bank playing cards similar to Visa and MasterCard, these do not meet the needs of each player. For making deposits at a web-based Kenyan on line casino M-Pesa is a top choice for many gamers, which comes as little surprise given the recognition of cellular gaming. The best Kenya online casinos include a variety of other games and conventional versions of popular online casino games like roulette and blackjack.

Lastly, remember that whereas no deposit-free spins can be a good way to boost your bankroll, they dont appear to be necessarily guaranteed to make you a revenue. So dont go in expecting to win huge give consideration to having fun and enjoying responsibly. Another casino that gives free spins with no deposit required is LeoVegas Casino. They offer new gamers up to 50 free spins with no deposit required. Most Kenyans will deposit and withdraw utilizing their credit score or debit card, as its incredibly handy, plus it presents excessive ranges of safety. E-wallets, corresponding to PayPal, Skrill and Neteller, are additionally generally used.

Because soon as gamers are situated of their lowest deposit, they may allowed carry out for once they need, at as a lot worth as theyve got on an people account. These individuals want inside order to withdraw their very own account, the robot free to perform. This is amongst the many few betting choices over online gambling that does not need a smallest deposit start with playing. We have completely examined and reviewed on-line casinos in Kenya to deliver you the most effective operators. Another popular casino recreation that gamers are always on the lookout for is blackjack. The recognition of bitcoin blackjack casinospeaked with the introduction of card counting.

A prerequisite for receiving a cashback bonus is to keep in mind the time restrict of this promotion. One of the finest options amongst spin on line casino website gaming fashions is minimal deposit essential need. Players arent required to put any cash to suppose about taking part in.

You will be succesful of make deposits using Bitcoin as nicely as withdraw winnings utilizing the same format. The cause why theres been a mass exodus of a few of the prime online casinos is because of the increased tax on the profit of the operators. However, this was briefly halted by the Supreme Court, which sparked the hope of seeing a few of the prime local on-line casinos opening their doors to patrons soon. Software developers within the on-line casino area of interest refer to these companies behind the games that you simply play. Some of the massive guns in the industry value their popularity and as such, will solely work with legitimate online on line casino manufacturer...

23:32

Play On-line Roulette h+ Media

Play On-line Roulette

It is value maintaining in mind nonetheless that the game choice on casino apps will normally be barely smaller. This is as a result of some older games havent been optimised for cellular gaming. Yet on the plus side, the preferred games and new releases are normally mobile-friendly, so the impression in your playing expertise must be minimal. In your most popular Kenyan on-line casino, make sure you are conscious of the out there cost choices earlier than registering. Another thing that you just must also check is whether the games at the KE on line casino sites have truthful payout rates. The Odibets casino platform has a straightforward to navigate interface with a variety of games, making it certainly one of, if not the most effective on-line on line casino in Kenya and Ghana.

On the opposite hand, when you have performed through the spins, you can nonetheless avail extra with the same deposit. One may say that it is not low as the deposit quantity is 5 euros. But considering the cash prizes, choosing Trada could be quite worthwhile for you.

A free casino bonus also has situations for its use and will or not be restricted to certain games. You may even have to use the bonus inside a specified time interval. These are the kinds of bonuses that we noticed earlier from Helabet and 1xBet. [newline]Here the free spins are used as an enticement to enroll for a brand new customer account. Players will register with the net casino and receive free spins as part of their welcome bonus. At Caxino, you presumably can spin the wheel at a minimum deposit of only 1 euro.

Also, the on line casino sets the value of every free spin, and players can not change this. Although there are several types of free spins bonuses , the fundamentals are the identical. The spins can be found on a selection of slots, which keeps things fresh and fascinating. And, of course, after taking half in the spins, you still have the matched deposit bonus to take pleasure in. Presently, you may solely play the dedicated Roulette77 sport from a desktop web site and directly on the website. The good news is you can still accomplish that from a mobile phone which can make it straightforward so that you simply can play remotely should you select to, which is useful.

No matter which methodology you determine to deposit funds to be a winner in these games you must read via the entire wagering rules previous to you make your deposit. While deposit bonuses are the commonest kind of online on line casino bonus, probably the most interesting for slot lovers are the Free Spins. On this page we focus extra on this sort of casino bonus, providing you with helpful details about how to use free spin and the place to find them. This is among the advantages that online casinos offer versus native casinos or slot halls. With the help of free spins, you can attempt free slot video games and whether this slot recreation is sweet for y...

09:34

Functions For The 2021 Nzes Mentoring Scheme Now Open h+ Media

Functions For The 2021 Nzes Mentoring Scheme Now Open

You can choose the English variant, and its clear that the standard of the interpretation of 1xBet sport betting platform could also be very extreme. We can see the sections of the matches, promos, virtual sports activities, slot machines and a lot of others. Easy entry to on line on line casino from the 1xBet sport betting part to the on line casino and, and vice versa.

For soccer lovers, betting can be made on the outcome of the match as nicely as corners, free kicks, and yellow cards, and so on. When you be a part of the 1xbet on line casino section, a plethora of slot video games are at your fingertips. You can enjoy titles that have been impressed by animals, mythology, movies, Politicians, TV sequence, stars, and more. The betting and gaming site is simple to navigate since it features a user-friendly interface. Each betting possibility is accompanied by a straightforward to navigate drop-down that promotes self-discovering.

We need to make it simple so that you simply can browse, find and check out an electrical bike (e-bike) that works for you, from an intensive range of high quality ebike brands. From commuter ebikes, to folding e-bikes to electrical mountain bikes, we have a motorcycle to fit your finances and use. Book a free check journey at Electrify NZ and luxuriate in the advantages of an e-bike today.

There are an enormous number of high-quality on line casino games to choose from. Then your bookmaker might ask to supply a photo or check out of passport or some other personal doc that may verify your id. After that, youll be redirected for the webpage, to buy a account generated mechanically. Near the top of the home web page from the app, you can find the alternative registration button. Select the country program code within the subject with the cellphone quantity. Thats the reason the company offers not one but a level of choices for this well-liked online game with Jackpot and nice payout.

The know-how guarantees around the clock protection for personal information. The process is similar to setting an individual guess with the difference that there are extra options over the coupon that you ought to use. Choose the combinations you need, place your guess, and validate it.

The bookmakers group made positive that the bettors had a chance to guess on sports activities actions or play within the on line on line casino, poker and slots, and so forth. To begin betting on 1xBet bd or play 1xBet poker, you must first register and replenish your stability. Betting change alternative consists of eight the most well-liked sports actions to guess efficiently in opposition to other prospects. Nonetheless, lets not get ahead of ourselves for the explanation that ultimate verdict relies upon tremendously on the net sites payment/withdrawal capabilities. Now you need to type in the information, collectively together with your full...

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog